Hi,
Thanks for reporting this issue. I can't seem to reproduce it though
with Oracle Linux v8 running openssh-server-8.0p1-17.el8.x86_64 and an
Ubuntu 22.04 client running 1:8.9p1-3ubuntu0.6.
Could you perhaps give me a bit more details on how I could reproduce
this?
Thanks!
--
You received th
The Oracle Linux I'm running is the v8 developer preview, as that is the
only freely downloadable version.
I couldn't reproduce the issue with openssh-server-8.0p1-17.el8.x86_64.
Since I can't get newer packages from Oracle with this version, I
installed openssh, openssh-askpass, openssh-client a
OK, I have managed to locate the Oracle binary packages for
8.0p1-19.el8_9.2 and can confirm the issue. This is curious as the same
packages from RockyLinux appear to work. I will attempt to investigate
the differences.
--
You received this bug notification because you are a member of Ubuntu
Touc
I believe this issue is caused by a bad backport in Oracle's
8.0p1-19.el8_9.2 package. I think their fix for CVE-2023-48795 isn't
properly adding kex-strict-s-...@openssh.com to their KEX. Downgrading
the Ubuntu package works around the problem as that prevents the client
from offering kex-strict-c
I am closing this bug since the issue appears to be in Oracle Linux and
is being tracked here:
https://github.com/oracle/oracle-linux/issues/125
Thanks!
** Bug watch added: github.com/oracle/oracle-linux/issues #125
https://github.com/oracle/oracle-linux/issues/125
** Changed in: openssh (Ub
This should get sent to debian too.
Quick question: is pkcs11.txt a default filename used anywhere else?
Where did the filename come from?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.
ACK on the policy file location change.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/2016303
Title:
Rebuild NSS with support for system-wide config file
Status in nss packa
The only curious thing with using "pkcs11.txt" is that is usually used
with the security databases. Per some of the manpages:
In 2009, NSS introduced a new set of databases that are SQLite databases
rather than BerkeleyDB. These new databases provide more accessibility and
performance:
+1 from security. Please remember to also release it to the -security
pocket on all releases in addition to just -updates.
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to tzdata in Ubuntu.
https://bugs.launchpad.net/b
Hi,
What the contents of the /etc/dnsmasq.d directory?
Is there a symlink to /etc/dnsmasq.d-available/libvirt-daemon ?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dnsmasq in Ubuntu.
https://bugs.launchpad.net/bugs/2055455
Thanks for filing this bug, and the excellent analysis.
So it looks like the dnsmasq change was introduced here:
https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=744231d99505cdead314d13506b5ff8c44a13088
That was in response to this mailing list discussion:
https://lists.thekelleys.org.u
This may be caused by the same issue as bug 2055776. I am preparing
updated packages with the problematic commit reverted for testing.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dnsmasq in Ubuntu.
https://bugs.launchpad.n
Out of curiosity, what is the contents of your /etc/dnsmasq.d directory?
Is there a symlink in there to /etc/dnsmasq.d-available/libvirt-daemon?
What is the contents of that file?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed t
I will prepare updates for testing with the problematic commit reverted.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dnsmasq in Ubuntu.
https://bugs.launchpad.net/bugs/2055776
Title:
After updating ubuntu, the network t
Do you know what else could be listening on that interface? What's the
output of "netstat --tcp --udp --listening --programs --numeric"?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dnsmasq in Ubuntu.
https://bugs.launchpad
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dnsmasq in Ubuntu.
https://bugs.launchpad.net/bugs/2055776
Title:
After updating ubuntu, the network to which the su
What's the output of "sudo netstat --tcp --udp --listening --programs
--numeric"? Thanks!
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dnsmasq in Ubuntu.
https://b
So, it looks like you are running bind on this machine, and bind is
listening on port 53 UDP:
udp0 0 192.168.122.1:530.0.0.0:*
1521/named
The old dnsmasq would ignore the error when it couldn't bind to a port,
but the new dnsmasq will fail if the port is already used, which m
That is great news, I'm glad we've identified the root cause of the
problem and you have successfully resolved it.
I will mark this bug as invalid since, while the dnsmasq update did
change behaviour, the behaviour change revealed a configuration issue
rather than being an actual regression.
Than
By default bind will listen on all interfaces. I don't understand why
we're not seeing anything listening on 192.168.122.1 but you are still
getting the error message.
I suggest adding a listen-on directive to your
/etc/bind/named.conf.options file, restarting bind, and seeing if
libvirt will now
I am marking this bug as "invalid" per your last comment. Thanks!
** Changed in: dnsmasq (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dnsmasq in Ubuntu.
https://bugs.launchpad.net/bug
I'm not sure I understand this bug, the --with-pc-insults option is
deprecated since 2017-09-18 as it is the default option.
The noble package doesn't use --enable-offensive-insults.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscrib
Great, I'll leave this bug open for now. Please let us know if there is
anything that is enabled that shouldn't be. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sudo in Ubuntu.
https://bugs.launchpad.net/bugs/205805
Actually, I think you're right, the brains one does seem to be included
because while that upstream patch does do the following to
plugins/sudoers/ins_classic.h, it didn't apply the same change to
plugins/sudoers/ins_csops.h:
-#ifdef PC_INSULTS
+#ifndef OFFENSIVE_INSULTS
--
You received this bug
Could you please file a bug upstream about the missing change, and let
us know the bug number?
https://bugzilla.sudo.ws/index.cgi
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sudo in Ubuntu.
https://bugs.launchpad.net/bugs
I'll fix this issue in noble.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sudo in Ubuntu.
https://bugs.launchpad.net/bugs/2058053
Title:
Change sudo compile options from --with-all-insults to --with-pc-
insults
Statu
w => Confirmed
** Changed in: sudo (Ubuntu Noble)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sudo in Ubuntu.
https://bugs.launchpad.net/bugs/2058053
The same issue was present with the old dnsmasq package...for example:
https://autopkgtest.ubuntu.com/results/autopkgtest-
jammy/jammy/amd64/s/systemd/20240224_133847_88f29@/log.gz
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed
It appears most of the systemd autopkgtest failures are because of this
flaky test:
https://autopkgtest.ubuntu.com/packages/systemd/jammy/amd64
The effort required to manually retrigger systemd autopkgtests because
of that flaky test is substantial. We should disable that particular
test unless s
FYI This is now in the jammy and focal upload queues to go to -proposed.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1597017
Title:
mount rules grant excessive permiss
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/2060906
Title:
attempt to add opensc using modutil suddenly fails
St
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/2060968
Title:
SafeNet Authentication Client eToken driver error
Sta
*** This bug is a duplicate of bug 2060906 ***
https://bugs.launchpad.net/bugs/2060906
This is the same core issue as bug #2060906, so marking as a duplicate,
please follow the progress in that bug. Thanks!
** This bug has been marked a duplicate of bug 2060906
attempt to add opensc using
(Ubuntu Focal)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: nss (Ubuntu Jammy)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: nss (Ubuntu Focal)
Status: New => In Progress
** Changed in: nss (Ubuntu Jammy)
Status:
I have uploaded packages that fix this issue for focal and jammy to the
security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Once they have finished building, please test them to make sure they fix
the issue for you, and I will publish them as a s
Thanks for testing, I'll publish the regression fix as soon as all archs
have finished building.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/2060906
Title:
attempt to add o
** Changed in: nss (Ubuntu)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/2060906
Title:
attempt to add opensc using modutil suddenly fail
https://ubuntu.com/security/notices/USN-6727-2
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/2060906
Title:
attempt to add opensc using modutil suddenly fails
Status in nss
@adampankow: the bug only applied to focal and jammy, which are marked
as "fix released", the "invalid" task is the development release noble,
which isn't affected by this bug. This looks a bit odd, but it's how
launchpad bugs work.
--
You received this bug notification because you are a member o
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
)
Importance: Undecided
Assignee: Marc Deslauriers (mdeslaur)
Status: In Progress
** Affects: ca-certificates (Ubuntu Focal)
Importance: Undecided
Assignee: Marc Deslauriers (mdeslaur)
Status: In Progress
** Affects: ca-certificates (Ubuntu Impish)
Importance
Changed in: ca-certificates (Ubuntu Bionic)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: ca-certificates (Ubuntu Focal)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: ca-certificates (Ubuntu Impish)
Assignee: (unassigned) => Ma
My understanding is the Debian experimental version doesn't support both
at the same time, it's one or the other depending on which binary
package you install. We definitely don't want that.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is s
*** This bug is a security vulnerability ***
Public security bug reported:
This bug is to track the security update that will contain these
possibly security-relevant commits:
https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=e2b0f0d8d63e1223bb714a9efb37e2257818268b
https://git.kern
This is also required:
https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/profiles/audio/avdtp.c?id=0388794dc5fdb73a4ea88bcf148de0a12b4364d4
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to bluez in Ubuntu.
https://bugs
There is an openssl security update announced for June 21st. If the
package in -proposed doesn't get tested and switched to "verification-
done", it will be superseded by a security update once again.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages,
** Bug watch added: Debian Bug tracker #1009927
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009927
** Also affects: krb5 (Debian) via
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009927
Importance: Unknown
Status: Unknown
** Changed in: krb5 (Ubuntu)
Status: Ne
Oh, so it only copies the file over on new installs, that makes sense,
and could be easily changed in stable releases.
I have no big preference, but perhaps it would be good to have it SRUed
to 22.04.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages,
Since the upstream bug is public, I am making this bug public also.
** Bug watch added: GCC Bugzilla #105115
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105115
** Also affects: binutils via
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105115
Importance: Unknown
Status: Unknown
*
ACK on the debdiff in comment #5, I am currently building it (with a
slight change to add the bug number to the changelog) and will release
it as a security update next week. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribe
** Changed in: gdk-pixbuf (Ubuntu)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gdk-pixbuf in Ubuntu.
https://bugs.launchpad.net/bugs/1982898
Title:
CVE-2021-46829: Buffer overw
** Changed in: binutils (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to binutils in Ubuntu.
https://bugs.launchpad.net/bugs/1974265
Title:
`demangle_const` causes infinite recursion
** Changed in: gst-plugins-bad1.0 (Ubuntu)
Status: New => Fix Committed
** Changed in: gst-plugins-bad1.0 (Ubuntu)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, wh
** Changed in: openafs (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/bugs/1914279
Title:
linux from security may force reb
This was addressed in the python packages in Jammy.
We will not be enabling PIE in the stable releases, so I am marking those
particular tasks as Won't Fix.
Thanks!
** Changed in: python3.6 (Ubuntu)
Status: Confirmed => Won't Fix
** Changed in: python3.7 (Ubuntu)
Status: Confirmed
I also don't think this is a blocker anymore, as long as polkitd-pkla is
a strong dependency in Ubuntu, so we don't inadvertently stop shipping
it. It would be nice to get a similar list of packages in Ubuntu, as I
suspect we have many more than Debian. We may also need to update the
policykit-desk
Ah yes, this should be fixed now because of the security update. I meant
to update this bug, but forgot. Thanks for noticing.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/
I'll let someone else decide if this bug is still worth fixing even
though we aren't using the helper anymore.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/2051574
Title:
** Bug watch added: github.com/python/cpython/issues #124170
https://github.com/python/cpython/issues/124170
** Also affects: python via
https://github.com/python/cpython/issues/124170
Importance: Unknown
Status: Unknown
** Bug watch added: Debian Bug tracker #1079780
https://b
Minor OpenSSL releases have historically introduced a whole lot of
behaviour and API changes that required fixing dozens of other packages
in the archive. I don't recommend putting 3.0.5 in backports.
What I suggest is to actually SRU the 3-4 commits that fix
SSL_OP_LEGACY_SERVER_CONNECT to the ve
It looks like you forgot to add the following to the changelog:
- debian/control:
+ Build-Conflicts on fakeroot (<< 1.25.3-1.1ubuntu1)
- debian/sudo[-ldap].manpages: install man/man8/sudo_root.8
- debian/sudo[-ldap].init: delete init scripts, as they are no longer
necessary
Thanks! New changelog looks good, I am uploading it now, with a slight
change to split one of the lines that was long and generating a lintian
error.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sudo in Ubuntu.
https://bugs
Yes, I plan on releasing 3.2.7 to jammy and kinetic as a security update
possibly next week, so that should take care of this issue at the same
time.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to rsync in Ubuntu.
https://bug
I need to see the filenames that got rejected. You can send them to me
in private is required. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to rsync in Ubuntu.
https://bugs.launchpad.net/bugs/2009575
Title:
Upgrade
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to rsync in Ubuntu.
https://bugs.launchpad.net/bugs/2009575
Title:
Upgrade to 3.1.3-8ubuntu0.5 causing sync errors
Sta
I'm going to need a reproducer for this issue so I can figure out what's
not working in your specific example.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to rsync in Ubuntu.
https://bugs.launchpad.net/bugs/2009575
Title:
So after looking further into the way the systems affected by this issue
are configured, this is what is happening:
1- rsync client is requesting a directory: rsync -v -rp
sshuser@server:/var/cache/foo /tmp/foo
2- the server has an ssh forced command configured that is returning the
contents of
Please file a new bug for that issue, this bug is unrelated to the issue
you are having, and is closed. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to rsync in Ubuntu.
https://bugs.launchpad.net/bugs/2002918
Title:
I can confirm the scenario described in comment #5 is what is causing
the issue. There are two ways to correctly fix it: 1- ask for the right
directory that matches the forced command, or 2- use the new --old-args
option that was backported to the security update, that should bypass
the new securit
As this is working as expected, I am marking this bug as "invalid".
Thanks!
** Changed in: rsync (Ubuntu)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to rsync in Ubuntu.
https://bugs.launc
.
Thanks!
** Changed in: backintime (Ubuntu)
Status: Invalid => In Progress
** Changed in: backintime (Ubuntu)
Assignee: buhtz (buhtz) => Marc Deslauriers (mdeslaur)
** Also affects: rsync (Ubuntu Lunar)
Importance: Undecided
Status: New
** Also affects: backintime (
Some users only have the -security pocket enabled, and not -updates, so
when a fix is required for a regression introduced by a security update,
it needs to go to the -security pocket. It doesn't in any way mean BIT
had a security issue.
--
You received this bug notification because you are a mem
Looks like the rsync security update doesn't like the way unison is
handling arguments. Perhaps adding --old-args to the command lines here
would help:
copyprog = rsync -a -A -X --rsh=ssh --inplace --compress
copyprogrest = rsync -a -A -X --rsh=ssh --partial --inplace --compress
--
You received
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to rsync in Ubuntu.
https://bugs.launchpad.net/bugs/2009756
Title:
backups fail since latest rsync security update
Sta
Oh whoops, sorry about that, I'll upload a fixed version first thing
tomorrow (after at least installing it this time).
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to rsync in Ubuntu.
https://bugs.launchpad.net/bugs/2009756
I have fixed the typo, and have uploaded new packages to the PPA listed
above. I've run a successful backup with them on both jammy and kinetic.
Could you please confirm they fix the issue for you? Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded pack
Great, I'll release the updates monday morning. Thanks for testing!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to rsync in Ubuntu.
https://bugs.launchpad.net/bugs/2009756
Title:
backups fail since latest rsync security up
** Changed in: rsync (Ubuntu Jammy)
Status: New => Invalid
** Changed in: rsync (Ubuntu Kinetic)
Status: New => Invalid
** Changed in: rsync (Ubuntu Lunar)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages,
Hi,
The security fix for CVE-2022-29154 unfortunately changed the way
arguments are handled.
Could you try adding --old-args ? That should restore the previous
behaviour you are expecting.
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-29154
--
You received this bug notifica
I am closing this bug, since the new behaviour is expected with the
security fix. Thanks!
** Changed in: rsync (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to rsync in Ubuntu.
https://bu
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/2007730
Title:
Unpatched CVE in Jammy
Status in openss
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Note to future mdeslaur: re-mashing the retry button will eventually
result in the test passing and the build succeeding.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gst-plugins-bad1.0 in
Ubuntu.
https://bugs.launchpad.net
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
What desktop environment are you using?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ubuntu-meta in Ubuntu.
https://bugs.launchpad.net/bugs/2047595
Title:
sound control panel security
Status in gnome-shell package in Ub
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to network-manager in Ubuntu.
https://bugs.launchpad.net/bugs/2046633
Title:
Don't include 'nmcli -f all con' output in
** Package changed: ubuntu-meta (Ubuntu) => gnome-shell (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ubuntu-meta in Ubuntu.
https://bugs.launchpad.net/bugs/2047595
Title:
sound control panel security
Status in
** Changed in: pam (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pam in Ubuntu.
https://bugs.launchpad.net/bugs/2046526
Title:
pam_access Configuration Treats TTY Names as Hostname
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Also affects: pam (Ubuntu Focal)
Importance: Undecided
Status: New
** Also affects: pam (Ubuntu Hirsute)
Importance: Undecided
Status: New
** Also affects: pam (Ubuntu Groovy)
Importance: Undecided
Status: New
** Also affects: pam (Ubuntu Bionic)
Importance: U
The debdiffs in comment #1 currently create a multiarch manpage
collision because of a pam packaging particularity. (See bug 1558597 for
an example)
I will update the debdiffs to correct the issue and will post them here
once done.
--
You received this bug notification because you are a member o
** Patch added: "Hirsute debdiff"
https://bugs.launchpad.net/ubuntu/+source/pam/+bug/1927796/+attachment/5496423/+files/pam_1.3.1-5ubuntu6.21.04.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pam in Ubuntu.
http
** Patch added: "Focal debdiff"
https://bugs.launchpad.net/ubuntu/+source/pam/+bug/1927796/+attachment/5496425/+files/pam_1.3.1-5ubuntu4.2.debdiff
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pam in Ubuntu.
https://bugs
** Patch added: "Bionic debdiff"
https://bugs.launchpad.net/ubuntu/+source/pam/+bug/1927796/+attachment/5496426/+files/pam_1.1.8-3.6ubuntu2.18.04.3.debdiff
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pam in Ubuntu.
htt
** Patch added: "Groovy debdiff"
https://bugs.launchpad.net/ubuntu/+source/pam/+bug/1927796/+attachment/5496424/+files/pam_1.3.1-5ubuntu6.20.10.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pam in Ubuntu.
https
1 - 100 of 1139 matches
Mail list logo