Here is the upstream bug tracking this issue:
https://bz.apache.org/bugzilla/show_bug.cgi?id=69743
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2117112
Title:
421 Misdirected Request: apache2 regr
** Bug watch added: bz.apache.org/bugzilla/ #69743
https://bz.apache.org/bugzilla/show_bug.cgi?id=69743
** Also affects: apache2 via
https://bz.apache.org/bugzilla/show_bug.cgi?id=69743
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a me
*** This bug is a duplicate of bug 2115847 ***
https://bugs.launchpad.net/bugs/2115847
We regularly update ClamAV versions in ubuntu when upstream support for
it is no longer available, as when a release goes EOL it is no longer
possible to download database updates.
In this case, ClamAV 0.10
The jammy update was based on the packaging from later Ubuntu releases.
Unfortunately, you are right, it does look like it is lacking proper
socket migration.
To enable the socket with the jammy update, please create a file at
/etc/systemd/system/clamav-daemon.socket.d/tcp-socket.conf containing:
** Bug watch added: Debian Bug tracker #1042377
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1042377
** Also affects: clamav (Debian) via
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1042377
Importance: Unknown
Status: Unknown
--
You received this bug notification becau
the 70-insecure-fs.rules file was shipped in udisks2 (2.10.1-8), so
Oracular and later:
* Do not automatically mount unmaintained file systems.
Ship a udev rules files named 70-insecure-fs.rules which sets the udev
property UDISKS_AUTO to 0 for file systems that are marked as "Orphan"
So it looks like there's is also:
/usr/lib/udev/rules.d/70-insecure-fs.rules :
# Do not automatically mount these file systems because their drivers are
# marked as "Orphan" or "Odd Fixes" in the kernel MAINTAINERS file and so
# are more at risk of having security-sensitive defects which could be
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
** Information type changed from Private Security to Public Security
** Bug watch added: Debian Bug tracker #1106147
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106147
** Also affects: net-tools (Debian) via
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106147
Importance: Unk
*** This bug is a duplicate of bug 2111912 ***
https://bugs.launchpad.net/bugs/2111912
** This bug has been marked a duplicate of bug 2111912
CVE-2025-46836 fix breaks interface counters for ifconfig
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is s
Debdiff in comment #8 looks good, and was uploaded for processing by the
SRU team.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2110236
Title:
[SRU] fixes for AppArmor in Plucky
To manage notifica
** Also affects: apparmor (Ubuntu Questing)
Importance: Undecided
Status: New
** Also affects: apparmor (Ubuntu Plucky)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs
** Also affects: apparmor (Ubuntu Questing)
Importance: Undecided
Assignee: Ryan Lee (rlee287)
Status: New
** Also affects: apparmor (Ubuntu Plucky)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
I have removed the upload from the queue as an issue was discovered in
it. A new debdiff will be available soon.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2110236
Title:
[SRU] fixes for AppArmor
debdiff in comment #4 looks to contain the requested changes. Ack.
Uploaded for processing by the SRU team. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2110236
Title:
[SRU] fixes for AppAr
** Also affects: apparmor (Ubuntu Plucky)
Importance: Undecided
Status: New
** Also affects: apparmor (Ubuntu Questing)
Importance: Undecided
Assignee: Ryan Lee (rlee287)
Status: New
** Changed in: apparmor (Ubuntu Questing)
Status: New => Fix Released
** Changed
** Also affects: apparmor (Ubuntu Plucky)
Importance: Undecided
Status: New
** Also affects: apparmor (Ubuntu Questing)
Importance: Undecided
Assignee: Maxime Bélair (mbelair)
Status: Fix Released
** Changed in: apparmor (Ubuntu Plucky)
Status: New => In Progress
** Also affects: apparmor (Ubuntu Plucky)
Importance: Undecided
Status: New
** Also affects: remmina (Ubuntu Plucky)
Importance: Undecided
Status: New
** Also affects: apparmor (Ubuntu Questing)
Importance: Undecided
Assignee: Tim Andersson (andersson123)
Status
** Also affects: apparmor (Ubuntu Plucky)
Importance: Undecided
Status: New
** Also affects: apparmor (Ubuntu Questing)
Importance: Undecided
Status: New
** Changed in: apparmor (Ubuntu Questing)
Status: New => Fix Released
** Changed in: apparmor (Ubuntu Plucky)
** Also affects: apparmor (Ubuntu Plucky)
Importance: Undecided
Status: New
** Also affects: apparmor (Ubuntu Questing)
Importance: Undecided
Status: New
** Changed in: apparmor (Ubuntu Questing)
Status: New => Fix Released
** Changed in: apparmor (Ubuntu Plucky)
** Also affects: apparmor (Ubuntu Questing)
Importance: Undecided
Status: New
** Also affects: apparmor (Ubuntu Plucky)
Importance: Undecided
Status: New
** Changed in: apparmor (Ubuntu Questing)
Status: New => Fix Released
** Changed in: apparmor (Ubuntu Plucky)
** Also affects: apparmor (Ubuntu Plucky)
Importance: Undecided
Status: New
** Also affects: apparmor (Ubuntu Questing)
Importance: Undecided
Status: New
** Changed in: apparmor (Ubuntu Questing)
Status: New => Fix Released
** Changed in: apparmor (Ubuntu Plucky)
** Also affects: apparmor (Ubuntu Plucky)
Importance: Undecided
Status: New
** Also affects: apparmor (Ubuntu Questing)
Importance: Undecided
Status: New
** Changed in: apparmor (Ubuntu Questing)
Status: New => Fix Released
** Changed in: apparmor (Ubuntu Plucky)
** Also affects: apparmor (Ubuntu Plucky)
Importance: Undecided
Status: New
** Also affects: apparmor (Ubuntu Questing)
Importance: Undecided
Status: Fix Released
** Changed in: apparmor (Ubuntu Plucky)
Status: New => In Progress
--
You received this bug notification
ACK on the debdiff in comment #1. Uploaded for processing by the SRU
team. Thanks!
** Changed in: apparmor (Ubuntu Plucky)
Status: New => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bu
** Also affects: apparmor (Ubuntu Plucky)
Importance: Undecided
Status: New
** Also affects: apparmor (Ubuntu Questing)
Importance: Undecided
Status: Fix Released
** Changed in: apparmor (Ubuntu Plucky)
Status: New => In Progress
--
You received this bug notification
** Also affects: apparmor (Ubuntu Plucky)
Importance: Undecided
Status: New
** Also affects: apparmor (Ubuntu Questing)
Importance: Undecided
Status: Fix Released
** Changed in: apparmor (Ubuntu Plucky)
Status: New => In Progress
--
You received this bug notification
** Also affects: util-linux (Ubuntu Plucky)
Importance: Undecided
Status: New
** Also affects: apparmor (Ubuntu Plucky)
Importance: Undecided
Status: New
** Also affects: util-linux (Ubuntu Questing)
Importance: Medium
Status: Invalid
** Also affects: apparmor (Ubun
** Also affects: apparmor (Ubuntu Plucky)
Importance: Undecided
Status: New
** Also affects: iotop-c (Ubuntu Plucky)
Importance: Undecided
Status: New
** Also affects: apparmor (Ubuntu Questing)
Importance: Undecided
Status: Fix Released
** Also affects: iotop-c (Ub
** Also affects: apparmor (Ubuntu Plucky)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2110236
Title:
[SRU] fixes for AppArmor in Plucky
To manage notif
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2104279
Title:
rhythmbox crashed with SIGSEGV in rb_ext_db_cancel_requests()
To manage noti
** Information type changed from Private Security to Public Security
** Changed in: linux-bluefield (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/21099
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Actually, it looks like this got fixed in plucky by the following Debian
change:
https://salsa.debian.org/libvirt-
team/libvirt/-/commit/e09852843c703ba3534da3c1174d5bf0f0d339ce
So noble and oracular are the affected releases which don't ship the
file.
** Changed in: libvirt (Ubuntu Plucky)
Public bug reported:
The libvirt package contains debian/libvirt-daemon.README.Debian which
contains important information, namely that the libvirtd group is root
equivalent.
While the file gets installed in focal and jammy by the libvirt-daemon
package, it looks like it's no longer getting insta
Please also release this to -security, thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2107391
Title:
Add Ubuntu 25.10 "Questing Quokka"
To manage notifications about this bug go to:
https://
Thanks Jeremy, I'll handle the stable releases.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2106404
Title:
poppler April 2025 security fixes
To manage notifications about this bug go to:
https://
I can confirm this regression and will upload a package with the
problematic patches reverted to the security team PPA for building in a
few minutes.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/21034
** Changed in: python3.8 (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2103454
Title:
3.8.10-0ubuntu1~20.04.16 broke IPv6 zone parsing
To manage notifications
Package is now building in the security team PPA here, and will be
released as soon as the builds are done:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
I am making this bug public as this regression is probably hitting more
than one person.
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/b
https://ubuntu.com/security/notices/USN-7337-1
** Changed in: libreoffice (Ubuntu Focal)
Status: In Progress => Fix Released
** Changed in: libreoffice (Ubuntu Jammy)
Status: In Progress => Fix Released
** Changed in: libreoffice (Ubuntu Noble)
Status: In Progress => Fix Rel
Thanks! Packages are now building in the security team PPA and will be
released soon.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2100975
Title:
CVE-2025-1080
To manage notifications about this b
Hi Rachanan,
Since the standard support for Ubuntu 16.04 LTS has ended, fixing this
will be available in the ESM repository only. Are you still interested
in us sponsoring your fix even if it is only available as an ESM update?
Thanks!
--
You received this bug notification because you are a memb
** Also affects: nginx (Ubuntu Jammy)
Importance: Undecided
Status: New
** Also affects: nginx (Ubuntu Focal)
Importance: Undecided
Status: New
** Changed in: nginx (Ubuntu Focal)
Status: New => Confirmed
** Changed in: nginx (Ubuntu Jammy)
Status: New => Confir
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1987228
Title:
Bug display when turning to hibernation
To manage notifications about
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1977875
Title:
Ubuntu Desktop boot hangs absent zeroconf packets and after avahi-
daemon pu
** Changed in: nginx (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1977718
Title:
buffer overflow in nginx rtmp module
To manage notifications about this bu
** Changed in: gnome-shell (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1976478
Title:
Telegram Desktop steals input on Lock screen (Xorg session)
To manage
** Changed in: pcre2 (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1942673
Title:
glibc AddressSanitizer:DEADLYSIGNAL
To manage notifications about this bu
Since the upstream bug is public, I am making this bug public too.
Thanks.
** Also affects: launchphplib
Importance: Undecided
Status: New
** No longer affects: launchphplib
** Information type changed from Private Security to Public Security
** Changed in: plib (Ubuntu)
Status
Please file a bug with the upstream jhead developers here:
https://github.com/Matthias-Wandel/jhead/issues
Once you have done that, please add a comment here with the bug number.
Thanks!
** Changed in: jhead (Ubuntu)
Status: New => Incomplete
--
You received this bug notification becaus
This is CVE-2016-2568, and there is no solution to this issue as of
today.
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-2568
** Bug watch added: Debian Bug tracker #816062
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816062
** Also affects: policykit-1 (Debian) via
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
So, before systemd-tmpfiles was used, Ubuntu used tmpreaper to perform
periodic cleaning of the /tmp dir. tmpreaper had a list of exceptions:
--protect '/tmp/.X*-{lock,unix,unix/*}' \
--protect '/tmp/.ICE-{unix,unix/*}' \
--protect '/tmp/.iroha_{unix,unix/*}' \
--protect '/tmp/.ki2-{unix,unix/*}'
** Changed in: nvidia-graphics-drivers-535 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2097004
Title:
Security bug update to 535.230.02
To manage
** Changed in: linux (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073500
Title:
Ubuntu RT2x00 USB Driver Kernel Use-After-Free Vulnerability
To manage noti
** Changed in: pulseaudio (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2078822
Title:
With Bluetooth headset connect, a malicious program can crash
Pulsea
** Package changed: ubuntu => xscreensaver (Ubuntu)
** Changed in: xscreensaver (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2083047
Title:
Failure t
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2083312
Title:
linux-libc-dev package has vulnerabilities
To manage notifications about t
** Changed in: u-boot (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2086515
Title:
Cryptographically unsafe RNG used for FIT images
To manage notifications
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
** No longer affects: systemd (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2088433
Title:
Problems with tigervncserver copying credential files to /tmp
To manage notifications about this
** Also affects: policykit-1 via
https://github.com/polkit-org/polkit/issues/545
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2095001
Title:
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2097004
Title:
Security bug update to 535.230.02
To manage notifications about thi
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Please also release this package into the security pocket as we want to
keep them in sync. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070285
Title:
package tzdata 2024a-3ubuntu1.1 failed
These updates have been published. Thanks!
https://ubuntu.com/security/notices/USN-7228-1
** Changed in: libreoffice (Ubuntu Focal)
Status: In Progress => Fix Released
** Changed in: libreoffice (Ubuntu Jammy)
Status: In Progress => Fix Released
** Changed in: libreoffice (Ubuntu
Thanks for these! I'll upload them for building and will release them
when done.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2095307
Title:
CVE-2024-12425 and CVE-2024-12426
To manage notificatio
I believe this is caused by the snippets plugin. When I disable it, I no
longer get a crash on exit. Unfortunately, it looks like the snippets
plugin was removed in later versions.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https:
Unfortunately, there was a security update published today to the
existing packages, so we definitely need to respin the proposed packages
to 23.11.3 and 21.11.9.
https://ubuntu.com/security/notices/USN-7178-1
--
You received this bug notification because you are a member of Ubuntu
Bugs, which i
** Changed in: php7.4 (Ubuntu Jammy)
Status: Confirmed => Invalid
** Changed in: php7.4 (Ubuntu Noble)
Status: Confirmed => Invalid
** Changed in: php7.4 (Ubuntu Oracular)
Status: Confirmed => Invalid
** Changed in: php7.4 (Ubuntu Plucky)
Status: Confirmed => Invalid
Thanks for reporting this issue, we are currently investigating.
** Also affects: php7.4 (Ubuntu Oracular)
Importance: Undecided
Status: New
** Also affects: php7.4 (Ubuntu Noble)
Importance: Undecided
Status: New
** Also affects: php7.4 (Ubuntu Jammy)
Importance: Undecide
Due to lack of activity from the original bug reporter, we are closing
this bug.
** Changed in: openconnect (Ubuntu Bionic)
Status: New => Invalid
** Changed in: openconnect (Ubuntu Focal)
Status: New => Invalid
** Changed in: openconnect (Ubuntu)
Status: In Progress => Inva
Due to lack of activity from the original bug reporter, we are closing
this bug.
** Changed in: mediawiki (Ubuntu Bionic)
Status: In Progress => Invalid
** Changed in: mediawiki (Ubuntu Focal)
Status: In Progress => Invalid
** Changed in: mediawiki (Ubuntu Jammy)
Status: Fix
This only affected Focal, the later releases include the second commit
already.
** Changed in: mpg123 (Ubuntu Jammy)
Status: New => Fix Released
** Changed in: mpg123 (Ubuntu Noble)
Status: New => Fix Released
** Changed in: mpg123 (Ubuntu Oracular)
Status: New => Fix Releas
*** This bug is a security vulnerability ***
Public security bug reported:
The fix for CVE-2024-10573 is insufficient in certain releases, pending
investigation. This is the tracking bug.
** Affects: mpg123 (Ubuntu)
Importance: Undecided
Assignee: Marc Deslauriers (mdeslaur
Since the jq and libonig focal packages contain mostly the same major
versions as the packages which are in main in jammy, and the detailed
information in comment #15, ACK from the security team on promoting them
to main in focal.
--
You received this bug notification because you are a member of
I think this is a great idea. We should, at the very least, print a
warning about password authentication if it's enabled, as that is a
default configuration we know should ideally be changed once a system is
installed.
--
You received this bug notification because you are a member of Ubuntu
Bugs
I'm adding the openssh package to this bug, as the default configuration
file has a Debian/Ubuntu-specific include directory configured and I
think we should add an appropriate comment to inform the user that files
included in the directory may override the configuration items in
ssd_config. This w
If you google "how to disable ssh password authentication", there are
pages and pages of instructions that instruct to modify sshd_config. I'm
not sure how to correct user expectations. Maybe adding more explicit
comments to sshd_config could be okay.
How is cloud-init making sure another file in
Perhaps an acceptable solution could be to write the file only if cloud-
init needs to overwrite the value to "no", but if the value is "yes",
the openssh default, it shouldn't create the file. This would allow
continuing to use the .d directory, but would prevent confusion which
results in passwor
While the override directory is documented, it is quite unexpected that
a default installation will make use of it, which is why this bug exists
in the first place.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad
Is there a reason cloud-init needs to create an override in the first
place, rather than changing the setting in the main file?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2088207
Title:
cloud-ini
@james-page thanks for the tests, will publish today.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2085851
Title:
Jammy package 2:20.3.1-0ubuntu1.4 is missing the upstream privsep
pieces
To mana
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Changed in: roundcube (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2085666
Title:
Roundcube CVE-2024-37383 and CVE-2024-37384
To manage notifications ab
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2086546
Title:
I get the bug as an esm bug problem when I write the command sudo apt
updat
1 - 100 of 11814 matches
Mail list logo