[Touch-packages] [Bug 1889443] Re: "ValueError: ['separator'] has no binary content" when running `apport-unpack /var/crash/...`
I believe this fix should be backported into Ubuntu 18.04, 20.04 and 22.04 through an SRU. -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to apport in Ubuntu. https://bugs.launchpad.net/bugs/1889443 Title: "ValueError: ['separator'] has no binary content" when running `apport-unpack /var/crash/...` Status in Apport: Fix Released Status in apport package in Ubuntu: Fix Released Bug description: The crash file I'm using is as-produced by the system (on groovy), and appears to have an empty value for separator: $ grep separator /var/crash/_usr_bin_neomutt.1000.crash separator: Traceback (most recent call last): File "/usr/bin/apport-unpack", line 77, in pr.extract_keys(f, bin_keys, dir) File "/usr/lib/python3/dist-packages/problem_report.py", line 269, in extract_keys raise ValueError('%s has no binary content' % ValueError: ['separator'] has no binary content ProblemType: Bug DistroRelease: Ubuntu 20.10 Package: apport 2.20.11-0ubuntu42 ProcVersionSignature: Ubuntu 5.4.0-37.41-generic 5.4.41 Uname: Linux 5.4.0-37-generic x86_64 NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair nvidia_modeset nvidia ApportVersion: 2.20.11-0ubuntu42 Architecture: amd64 CasperMD5CheckResult: skip CrashReports: 640:1000:117:1620030:2020-07-29 12:16:57.045274496 -0400:2020-07-29 12:19:15.559243636 -0400:/var/crash/_usr_bin_neomutt.1000.crash 640:1000:117:4399480:2020-07-23 10:30:21.433552906 -0400:2020-07-23 10:30:18.921508067 -0400:/var/crash/_usr_bin_pavucontrol.1000.crash 640:1000:117:29909:2020-07-29 12:19:15.603244279 -0400:2020-07-29 12:19:15.603244279 -0400:/var/crash/_usr_bin_apport-unpack.1000.crash CurrentDesktop: i3 Date: Wed Jul 29 12:22:54 2020 InstallationDate: Installed on 2019-05-07 (448 days ago) InstallationMedia: Ubuntu 18.04.2 LTS "Bionic Beaver" - Release amd64 (20190210) PackageArchitecture: all SourcePackage: apport UpgradeStatus: Upgraded to groovy on 2020-06-22 (37 days ago) To manage notifications about this bug go to: https://bugs.launchpad.net/apport/+bug/1889443/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1987706] Re: [FFe] Should preinstall network-manager-openconnect-gnome
** Description changed: The ubuntu-desktop package should recommend network-manager-openconnect- gnome, that is undergoing a main inclusion review (MIR) at bug #1986592. - I believe this deserves a feature freeze exception because it adds support to UBuntu for several types of - enterprise VPNs in wide use. + I believe this deserves a feature freeze exception because it adds + support to Ubuntu for several types of enterprise VPNs in wide use. -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to ubuntu-meta in Ubuntu. https://bugs.launchpad.net/bugs/1987706 Title: [FFe] Should preinstall network-manager-openconnect-gnome Status in ubuntu-meta package in Ubuntu: Incomplete Bug description: The ubuntu-desktop package should recommend network-manager- openconnect-gnome, that is undergoing a main inclusion review (MIR) at bug #1986592. I believe this deserves a feature freeze exception because it adds support to Ubuntu for several types of enterprise VPNs in wide use. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-meta/+bug/1987706/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1987707] Re: [FFe] Should preinstall network-manager-openconnect-gnome
** Description changed: The ubuntu-desktop package should recommend network-manager-openconnect- gnome, that is undergoing a main inclusion review (MIR) at bug #1986592. - I believe this deserves a feature freeze exception because it adds support to UBuntu for several types of - enterprise VPNs in wide use. + I believe this deserves a feature freeze exception because it adds + support to Ubuntu for several types of enterprise VPNs in wide use. -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to ubuntu-meta in Ubuntu. https://bugs.launchpad.net/bugs/1987707 Title: [FFe] Should preinstall network-manager-openconnect-gnome Status in ubuntu-meta package in Ubuntu: New Bug description: The ubuntu-desktop package should recommend network-manager- openconnect-gnome, that is undergoing a main inclusion review (MIR) at bug #1986592. I believe this deserves a feature freeze exception because it adds support to Ubuntu for several types of enterprise VPNs in wide use. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-meta/+bug/1987707/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1987706] [NEW] [FFe] Should preinstall network-manager-openconnect-gnome
Public bug reported: The ubuntu-desktop package should recommend network-manager-openconnect- gnome, that is undergoing a main inclusion review (MIR) at bug #1986592. I believe this deserves a feature freeze exception because it adds support to UBuntu for several types of enterprise VPNs in wide use. ** Affects: ubuntu-meta (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to ubuntu-meta in Ubuntu. https://bugs.launchpad.net/bugs/1987706 Title: [FFe] Should preinstall network-manager-openconnect-gnome Status in ubuntu-meta package in Ubuntu: New Bug description: The ubuntu-desktop package should recommend network-manager- openconnect-gnome, that is undergoing a main inclusion review (MIR) at bug #1986592. I believe this deserves a feature freeze exception because it adds support to UBuntu for several types of enterprise VPNs in wide use. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-meta/+bug/1987706/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1987707] [NEW] [FFe] Should preinstall network-manager-openconnect-gnome
Public bug reported: The ubuntu-desktop package should recommend network-manager-openconnect- gnome, that is undergoing a main inclusion review (MIR) at bug #1986592. I believe this deserves a feature freeze exception because it adds support to Ubuntu for several types of enterprise VPNs in wide use. ** Affects: ubuntu-meta (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to ubuntu-meta in Ubuntu. https://bugs.launchpad.net/bugs/1987707 Title: [FFe] Should preinstall network-manager-openconnect-gnome Status in ubuntu-meta package in Ubuntu: New Bug description: The ubuntu-desktop package should recommend network-manager- openconnect-gnome, that is undergoing a main inclusion review (MIR) at bug #1986592. I believe this deserves a feature freeze exception because it adds support to Ubuntu for several types of enterprise VPNs in wide use. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-meta/+bug/1987707/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1987336] [NEW] Multiple vulnerabilities in Focal
*** This bug is a security vulnerability *** Public security bug reported: The version in Ubuntu 20.04 is vulnerable to CVE-2020-13962, CVE-2020-17507 and CVE-2022-25255. I will provide a debdiff in this week. ** Affects: qtbase-opensource-src (Ubuntu) Importance: Undecided Assignee: Luís Cunha dos Reis Infante da Câmara (luis220413) Status: New ** Information type changed from Private Security to Public Security ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-13962 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-17507 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-25255 ** Changed in: qtbase-opensource-src (Ubuntu) Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara (luis220413) -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to qtbase-opensource-src in Ubuntu. https://bugs.launchpad.net/bugs/1987336 Title: Multiple vulnerabilities in Focal Status in qtbase-opensource-src package in Ubuntu: New Bug description: The version in Ubuntu 20.04 is vulnerable to CVE-2020-13962, CVE-2020-17507 and CVE-2022-25255. I will provide a debdiff in this week. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qtbase-opensource-src/+bug/1987336/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1698755] Re: package libqt5gui5:amd64 5.5.1+dfsg-16ubuntu7.5 failed to install/upgrade: package libqt5gui5:amd64 is not ready for configuration cannot configure (current status '
This is most likely an hardware issue. Please run the following command and retry: $ sudo dpkg --configure -a It is recommended that you upgrade to (or freshly install) a version of Ubuntu under standard support, even though you are covered by ESM if your machine has an Ubuntu Advantage subscription. ** Changed in: qtbase-opensource-src (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to qtbase-opensource-src in Ubuntu. https://bugs.launchpad.net/bugs/1698755 Title: package libqt5gui5:amd64 5.5.1+dfsg-16ubuntu7.5 failed to install/upgrade: package libqt5gui5:amd64 is not ready for configuration cannot configure (current status 'half-installed') Status in qtbase-opensource-src package in Ubuntu: Incomplete Bug description: 0.8.9-0ubuntu0.16.04.1 * Backport to xenial. - Fixes API connectivitity issues (LP: #1688056) 0.8.9-1 * New upstream release. 0.8.8-1 [ Mateusz Łukasik ] * New upstream release. - Drop 01_update-yr.no-url.patch -- included upstream. 0.8.7-3 * debian/patches: - fix obvious typo in 01_update-yr.no-url. 0.8.7-2 * debian/patches: - 01_update-yr.no-url added, update API url for Yr.no serice. 0.8.7-1 [ Mateusz Łukasik ] * New upstream release. (Closes: #774101) * debian/control: - Bump standards version to 3.9.8. - Use secured link for Vcs-Browser. * debian/watch: - Bump to version 4. ProblemType: Package DistroRelease: Ubuntu 16.04 Package: libqt5gui5:amd64 5.5.1+dfsg-16ubuntu7.5 ProcVersionSignature: Ubuntu 4.8.0-54.57~16.04.1-generic 4.8.17 Uname: Linux 4.8.0-54-generic x86_64 ApportVersion: 2.20.1-0ubuntu2.6 Architecture: amd64 Date: Mon Jun 19 10:06:12 2017 DuplicateSignature: package:libqt5gui5:amd64:5.5.1+dfsg-16ubuntu7.5 Setting up libcapnp-0.5.3:amd64 (0.5.3-2ubuntu1) ... dpkg: error processing package libqt5gui5:amd64 (--configure): package libqt5gui5:amd64 is not ready for configuration ErrorMessage: package libqt5gui5:amd64 is not ready for configuration cannot configure (current status 'half-installed') InstallationDate: Installed on 2017-03-26 (84 days ago) InstallationMedia: Xubuntu 16.04.2 LTS "Xenial Xerus" - Release amd64 (20170215) RelatedPackageVersions: dpkg 1.18.4ubuntu1.2 apt 1.2.20 SourcePackage: qtbase-opensource-src Title: package libqt5gui5:amd64 5.5.1+dfsg-16ubuntu7.5 failed to install/upgrade: package libqt5gui5:amd64 is not ready for configuration cannot configure (current status 'half-installed') UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qtbase-opensource-src/+bug/1698755/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1982652] Re: ddebs.ubuntu.com is down
** Changed in: apt (Ubuntu) Status: Fix Released => Confirmed ** Summary changed: - ddebs.ubuntu.com is down + ddebs.ubuntu.com is intermittently down ** Description changed: When running apt-get update (a few days ago and a few minutes ago), - ddebs.ubuntu.com is down, responding with HTTP 503: + ddebs.ubuntu.com is sometimes down, responding with HTTP 503: W: Failed to fetch http://ddebs.ubuntu.com/dists/focal/InRelease 503 Service Unavailable [IP: 185.125.190.18 80] W: Failed to fetch http://ddebs.ubuntu.com/dists/focal-updates/InRelease 503 Service Unavailable [IP: 185.125.190.18 80] W: Some index files failed to download. They have been ignored, or old ones used instead. + + This is an intermittent issue. ProblemType: Bug DistroRelease: Ubuntu 20.04 Package: apt 2.0.9 ProcVersionSignature: Ubuntu 5.15.0-41.44~20.04.1-generic 5.15.39 Uname: Linux 5.15.0-41-generic x86_64 ApportVersion: 2.20.11-0ubuntu27.24 Architecture: amd64 CasperMD5CheckResult: skip CurrentDesktop: ubuntu:GNOME Date: Sat Jul 23 07:54:35 2022 InstallationDate: Installed on 2022-04-26 (87 days ago) InstallationMedia: Ubuntu 20.04.4 LTS "Focal Fossa" - Release amd64 (20220223) SourcePackage: apt UpgradeStatus: No upgrade log present (probably fresh install) -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to apt in Ubuntu. https://bugs.launchpad.net/bugs/1982652 Title: ddebs.ubuntu.com is intermittently down Status in apt package in Ubuntu: Confirmed Bug description: When running apt-get update (a few days ago and a few minutes ago), ddebs.ubuntu.com is sometimes down, responding with HTTP 503: W: Failed to fetch http://ddebs.ubuntu.com/dists/focal/InRelease 503 Service Unavailable [IP: 185.125.190.18 80] W: Failed to fetch http://ddebs.ubuntu.com/dists/focal-updates/InRelease 503 Service Unavailable [IP: 185.125.190.18 80] W: Some index files failed to download. They have been ignored, or old ones used instead. This is an intermittent issue. ProblemType: Bug DistroRelease: Ubuntu 20.04 Package: apt 2.0.9 ProcVersionSignature: Ubuntu 5.15.0-41.44~20.04.1-generic 5.15.39 Uname: Linux 5.15.0-41-generic x86_64 ApportVersion: 2.20.11-0ubuntu27.24 Architecture: amd64 CasperMD5CheckResult: skip CurrentDesktop: ubuntu:GNOME Date: Sat Jul 23 07:54:35 2022 InstallationDate: Installed on 2022-04-26 (87 days ago) InstallationMedia: Ubuntu 20.04.4 LTS "Focal Fossa" - Release amd64 (20220223) SourcePackage: apt UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1982652/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1330770] Re: click packages rely upon tls for integrity and authenticity
Fixed in https://gitlab.com/ubports/development/core/lomiri-download- manager/-/commit/df3665685da5cfb559a06016d4e0339c29b903e1 (2015), that first appeared in version 0.9+15.10.20150723.2-0ubuntu1. ** Changed in: ubuntu-download-manager (Ubuntu) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to ubuntu-download-manager in Ubuntu. https://bugs.launchpad.net/bugs/1330770 Title: click packages rely upon tls for integrity and authenticity Status in Canonical System Image: Fix Released Status in Click Package Index: Fix Released Status in Software Center Agent: Fix Released Status in click package in Ubuntu: Fix Released Status in ubuntu-download-manager package in Ubuntu: Fix Released Status in ubuntu-system-settings package in Ubuntu: Fix Released Status in unity-scope-click package in Ubuntu: Fix Released Status in ubuntu-download-manager source package in Vivid: New Bug description: Hello, I just completed a quick review of the click source and the unity-scope-click source and behaviours, and found some opportunities for improvement. Debian, and Ubuntu, rely upon signed repository files with cryptographic hashes of packages to provide both integrity and authenticity checks for the packages hosted on that repository. The click framework and the unity-scope-click discovery and installation tool do not use signed repository files, nor do they have signatures of any sort on downloaded packages. The only integrity and authenticity checks are provided by the use of HTTPS. The click verify command will check files within the archive against MD5sums stored inside the archive but the click verify command is not used during package installation. (This is suitable for validating integrity against accidental changes only.) While it appears that unity-scope-click properly uses HTTPS to download package metadata and packages, HTTPS alone is insufficient for our needs: - Someone in a position to create new certificates at any of several hundred certificate authorities could create certificates purporting to be our update servers. This actual problem has been discovered in the wild with several certificate authorities issuing wild-card certificates or even certificates with signing authority. - X.509 is extremely complicated; TLS is extremely complicated. Flaws in both are inevitable. - HTTPS prevents the use of caching. - HTTPS only 'works' for data-in-motion; it is useless for data-at- rest integrity and authenticity checks. I have not yet reviewed the tools that application authors will use to upload their packages to our distribution servers but note in passing that most of these issues are also issues for adding packages to our update servers -- packages in flight within our network can be corrupted for many reasons, packages on disk can be corrupted for many reasons. A signature mechanism can protect against internal network faults, storage faults, and provide assurance months or years later that an uploaded package was uploaded by someone in control of a corresponding private key. Thanks To manage notifications about this bug go to: https://bugs.launchpad.net/canonical-devices-system-image/+bug/1330770/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1982652] Re: ddebs.ubuntu.com is down
Thanks for confirming this bug! Next time you encounter the issue described in a bug report, please mark yourself as affected by the bug report, that will automatically change the bug status from New to Confirmed. I will report this issue to the #ubuntu IRC channel. ** Changed in: apt (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to apt in Ubuntu. https://bugs.launchpad.net/bugs/1982652 Title: ddebs.ubuntu.com is down Status in apt package in Ubuntu: Confirmed Bug description: When running apt-get update (a few days ago and a few minutes ago), ddebs.ubuntu.com is down, responding with HTTP 503: W: Failed to fetch http://ddebs.ubuntu.com/dists/focal/InRelease 503 Service Unavailable [IP: 185.125.190.18 80] W: Failed to fetch http://ddebs.ubuntu.com/dists/focal-updates/InRelease 503 Service Unavailable [IP: 185.125.190.18 80] W: Some index files failed to download. They have been ignored, or old ones used instead. ProblemType: Bug DistroRelease: Ubuntu 20.04 Package: apt 2.0.9 ProcVersionSignature: Ubuntu 5.15.0-41.44~20.04.1-generic 5.15.39 Uname: Linux 5.15.0-41-generic x86_64 ApportVersion: 2.20.11-0ubuntu27.24 Architecture: amd64 CasperMD5CheckResult: skip CurrentDesktop: ubuntu:GNOME Date: Sat Jul 23 07:54:35 2022 InstallationDate: Installed on 2022-04-26 (87 days ago) InstallationMedia: Ubuntu 20.04.4 LTS "Focal Fossa" - Release amd64 (20220223) SourcePackage: apt UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1982652/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1982652] [NEW] ddebs.ubuntu.com is down
Public bug reported: When running apt-get update (a few days ago and a few minutes ago), ddebs.ubuntu.com is down, responding with HTTP 503: W: Failed to fetch http://ddebs.ubuntu.com/dists/focal/InRelease 503 Service Unavailable [IP: 185.125.190.18 80] W: Failed to fetch http://ddebs.ubuntu.com/dists/focal-updates/InRelease 503 Service Unavailable [IP: 185.125.190.18 80] W: Some index files failed to download. They have been ignored, or old ones used instead. ProblemType: Bug DistroRelease: Ubuntu 20.04 Package: apt 2.0.9 ProcVersionSignature: Ubuntu 5.15.0-41.44~20.04.1-generic 5.15.39 Uname: Linux 5.15.0-41-generic x86_64 ApportVersion: 2.20.11-0ubuntu27.24 Architecture: amd64 CasperMD5CheckResult: skip CurrentDesktop: ubuntu:GNOME Date: Sat Jul 23 07:54:35 2022 InstallationDate: Installed on 2022-04-26 (87 days ago) InstallationMedia: Ubuntu 20.04.4 LTS "Focal Fossa" - Release amd64 (20220223) SourcePackage: apt UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: apt (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug focal -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to apt in Ubuntu. https://bugs.launchpad.net/bugs/1982652 Title: ddebs.ubuntu.com is down Status in apt package in Ubuntu: New Bug description: When running apt-get update (a few days ago and a few minutes ago), ddebs.ubuntu.com is down, responding with HTTP 503: W: Failed to fetch http://ddebs.ubuntu.com/dists/focal/InRelease 503 Service Unavailable [IP: 185.125.190.18 80] W: Failed to fetch http://ddebs.ubuntu.com/dists/focal-updates/InRelease 503 Service Unavailable [IP: 185.125.190.18 80] W: Some index files failed to download. They have been ignored, or old ones used instead. ProblemType: Bug DistroRelease: Ubuntu 20.04 Package: apt 2.0.9 ProcVersionSignature: Ubuntu 5.15.0-41.44~20.04.1-generic 5.15.39 Uname: Linux 5.15.0-41-generic x86_64 ApportVersion: 2.20.11-0ubuntu27.24 Architecture: amd64 CasperMD5CheckResult: skip CurrentDesktop: ubuntu:GNOME Date: Sat Jul 23 07:54:35 2022 InstallationDate: Installed on 2022-04-26 (87 days ago) InstallationMedia: Ubuntu 20.04.4 LTS "Focal Fossa" - Release amd64 (20220223) SourcePackage: apt UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1982652/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1982430] [NEW] nm's -U flag does not work
Public bug reported: nm appears to behave as if the -U flag took an argument: $ nm -DU /usr/lib/x86_64-linux-gnu/libc.so.6 nm: 'a.out': No such file $ nm -DU . /usr/lib/x86_64-linux-gnu/libc.so.6 [3006 lines] ProblemType: Bug DistroRelease: Ubuntu 22.10 Package: binutils 2.38.90.20220713-2ubuntu1 ProcVersionSignature: Ubuntu 5.15.0-27.28-generic 5.15.30 Uname: Linux 5.15.0-27-generic x86_64 ApportVersion: 2.22.0-0ubuntu4 Architecture: amd64 CasperMD5CheckResult: pass CurrentDesktop: MATE Date: Wed Jul 20 23:53:19 2022 InstallationDate: Installed on 2022-06-26 (24 days ago) InstallationMedia: Ubuntu 22.10 "Kinetic Kudu" - Alpha amd64 (20220624) SourcePackage: binutils UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: binutils (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug kinetic -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to binutils in Ubuntu. https://bugs.launchpad.net/bugs/1982430 Title: nm's -U flag does not work Status in binutils package in Ubuntu: New Bug description: nm appears to behave as if the -U flag took an argument: $ nm -DU /usr/lib/x86_64-linux-gnu/libc.so.6 nm: 'a.out': No such file $ nm -DU . /usr/lib/x86_64-linux-gnu/libc.so.6 [3006 lines] ProblemType: Bug DistroRelease: Ubuntu 22.10 Package: binutils 2.38.90.20220713-2ubuntu1 ProcVersionSignature: Ubuntu 5.15.0-27.28-generic 5.15.30 Uname: Linux 5.15.0-27-generic x86_64 ApportVersion: 2.22.0-0ubuntu4 Architecture: amd64 CasperMD5CheckResult: pass CurrentDesktop: MATE Date: Wed Jul 20 23:53:19 2022 InstallationDate: Installed on 2022-06-26 (24 days ago) InstallationMedia: Ubuntu 22.10 "Kinetic Kudu" - Alpha amd64 (20220624) SourcePackage: binutils UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1982430/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1982422] [NEW] Multiple vulnerabilities in Bionic, Focal and Jammy
*** This bug is a security vulnerability *** Public security bug reported: The version in Bionic is vulnerable to all CVEs listed below. The versions in Focal and Jammy are vulnerable to CVE-2022-30067 and CVE-2022-32990. Please publish patched packages. ** Affects: gimp (Ubuntu) Importance: Undecided Status: New ** Information type changed from Private Security to Public Security ** Also affects: gimp (Ubuntu) Importance: Undecided Status: New ** No longer affects: gtk+2.0 (Ubuntu) ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-30067 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-32990 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12713 -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to gtk+2.0 in Ubuntu. https://bugs.launchpad.net/bugs/1982422 Title: Multiple vulnerabilities in Bionic, Focal and Jammy Status in gimp package in Ubuntu: New Bug description: The version in Bionic is vulnerable to all CVEs listed below. The versions in Focal and Jammy are vulnerable to CVE-2022-30067 and CVE-2022-32990. Please publish patched packages. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gimp/+bug/1982422/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 283115] Re: Gimp: toolbox windows can't be minimized
** Changed in: gimp (Ubuntu) Status: Confirmed => Fix Released ** Also affects: gtk+2.0 (Ubuntu) Importance: Undecided Status: New ** Bug watch added: bugzilla.gnome.org/ #586664 https://bugzilla.gnome.org/show_bug.cgi?id=586664 ** Also affects: gtk via https://bugzilla.gnome.org/show_bug.cgi?id=586664 Importance: Unknown Status: Unknown -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to gtk+2.0 in Ubuntu. https://bugs.launchpad.net/bugs/283115 Title: Gimp: toolbox windows can't be minimized Status in The Gimp: Fix Released Status in GTK+: Unknown Status in gimp package in Ubuntu: Fix Released Status in gtk+2.0 package in Ubuntu: New Bug description: gimp 2.6 in intrepid: it is impossible to minimize toolbar windows; they have only a x-Button to close ideally, these windows should be minimized automatically when the (last) Gimp image window is minimized Update While waiting, I designed some sort of workaround : Gnome>System>Preferences>Windows>Double-click titlebar>Roll up To manage notifications about this bug go to: https://bugs.launchpad.net/gimp/+bug/283115/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1982198] [NEW] apt update: Can not add an empty (zero-length) key to the cache
Public bug reported: When running sudo apt update, I get the following warning after the "Fetched" message: Can not add an empty (zero-length) key to the cache ProblemType: Bug DistroRelease: Ubuntu 20.04 Package: apt 2.0.9 ProcVersionSignature: Ubuntu 5.15.0-41.44~20.04.1-generic 5.15.39 Uname: Linux 5.15.0-41-generic x86_64 ApportVersion: 2.20.11-0ubuntu27.24 Architecture: amd64 CasperMD5CheckResult: skip CurrentDesktop: ubuntu:GNOME Date: Tue Jul 19 16:44:36 2022 InstallationDate: Installed on 2022-04-26 (84 days ago) InstallationMedia: Ubuntu 20.04.4 LTS "Focal Fossa" - Release amd64 (20220223) SourcePackage: apt UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: apt (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug focal -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to apt in Ubuntu. https://bugs.launchpad.net/bugs/1982198 Title: apt update: Can not add an empty (zero-length) key to the cache Status in apt package in Ubuntu: New Bug description: When running sudo apt update, I get the following warning after the "Fetched" message: Can not add an empty (zero-length) key to the cache ProblemType: Bug DistroRelease: Ubuntu 20.04 Package: apt 2.0.9 ProcVersionSignature: Ubuntu 5.15.0-41.44~20.04.1-generic 5.15.39 Uname: Linux 5.15.0-41-generic x86_64 ApportVersion: 2.20.11-0ubuntu27.24 Architecture: amd64 CasperMD5CheckResult: skip CurrentDesktop: ubuntu:GNOME Date: Tue Jul 19 16:44:36 2022 InstallationDate: Installed on 2022-04-26 (84 days ago) InstallationMedia: Ubuntu 20.04.4 LTS "Focal Fossa" - Release amd64 (20220223) SourcePackage: apt UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1982198/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1981874] [NEW] gdk_wayland_window_handle_configure_popup: assertion 'impl->transient_for' failed
Public bug reported: When running update-manager in the command line, viewing the changelogs for some updates and installing all updates, update-manager outputs the following to standard error. Gdk-Message: 07:32:40.867: Window 0x559accd09420 is a temporary window without parent, application will not be able to position it on screen. (update-manager:30618): Gdk-CRITICAL **: 07:32:40.878: gdk_wayland_window_handle_configure_popup: assertion 'impl->transient_for' failed Gdk-Message: 07:32:41.983: Window 0x559acd626210 is a temporary window without parent, application will not be able to position it on screen. (update-manager:30618): Gdk-CRITICAL **: 07:32:41.992: gdk_wayland_window_handle_configure_popup: assertion 'impl->transient_for' failed ProblemType: Bug DistroRelease: Ubuntu 22.04 Package: libgtk-3-0 3.24.33-1ubuntu2 ProcVersionSignature: Ubuntu 5.15.0-41.44-generic 5.15.39 Uname: Linux 5.15.0-41-generic x86_64 ApportVersion: 2.20.11-0ubuntu82.1 Architecture: amd64 CasperMD5CheckResult: pass CurrentDesktop: ubuntu:GNOME Date: Sat Jul 16 07:37:26 2022 InstallationDate: Installed on 2022-05-04 (72 days ago) InstallationMedia: Ubuntu 22.04 LTS "Jammy Jellyfish" - Release amd64 (20220419) SourcePackage: gtk+3.0 UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: gtk+3.0 (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug jammy wayland-session ** Summary changed: - gdk_wayland_window_handle_configure_popup: assertion 'impl->transient_for' failed Gdk-Message: 07:32:41.983: Window 0x559acd626210 is a temporary window without parent, application will not be able to position it on screen. (update-manager:30618): Gdk-CRITICAL **: 07:32:41.992: gdk_wayland_window_handle_configure_popup: assertion 'impl->transient_for' failed + gdk_wayland_window_handle_configure_popup: assertion 'impl->transient_for' failed -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to gtk+3.0 in Ubuntu. https://bugs.launchpad.net/bugs/1981874 Title: gdk_wayland_window_handle_configure_popup: assertion 'impl->transient_for' failed Status in gtk+3.0 package in Ubuntu: New Bug description: When running update-manager in the command line, viewing the changelogs for some updates and installing all updates, update-manager outputs the following to standard error. Gdk-Message: 07:32:40.867: Window 0x559accd09420 is a temporary window without parent, application will not be able to position it on screen. (update-manager:30618): Gdk-CRITICAL **: 07:32:40.878: gdk_wayland_window_handle_configure_popup: assertion 'impl->transient_for' failed Gdk-Message: 07:32:41.983: Window 0x559acd626210 is a temporary window without parent, application will not be able to position it on screen. (update-manager:30618): Gdk-CRITICAL **: 07:32:41.992: gdk_wayland_window_handle_configure_popup: assertion 'impl->transient_for' failed ProblemType: Bug DistroRelease: Ubuntu 22.04 Package: libgtk-3-0 3.24.33-1ubuntu2 ProcVersionSignature: Ubuntu 5.15.0-41.44-generic 5.15.39 Uname: Linux 5.15.0-41-generic x86_64 ApportVersion: 2.20.11-0ubuntu82.1 Architecture: amd64 CasperMD5CheckResult: pass CurrentDesktop: ubuntu:GNOME Date: Sat Jul 16 07:37:26 2022 InstallationDate: Installed on 2022-05-04 (72 days ago) InstallationMedia: Ubuntu 22.04 LTS "Jammy Jellyfish" - Release amd64 (20220419) SourcePackage: gtk+3.0 UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gtk+3.0/+bug/1981874/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1971001] Re: Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal and Jammy
Impish reached end-of-life yesterday. ** Summary changed: - Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal, Impish and Jammy + Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal and Jammy ** Description changed: - The versions in Trusty, Xenial, Bionic, Focal, Impish and Jammy may be + The versions in Trusty, Xenial, Bionic, Focal and Jammy may be vulnerable to all CVEs below. Debian released an advisory on March 24. -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to tiff in Ubuntu. https://bugs.launchpad.net/bugs/1971001 Title: Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal and Jammy Status in tiff package in Ubuntu: In Progress Bug description: The versions in Trusty, Xenial, Bionic, Focal and Jammy may be vulnerable to all CVEs below. Debian released an advisory on March 24. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/1971001/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1968922] Re: libnss3 is affected by CVE-2022-22747
Fixed in versions 2:3.35-2ubuntu2.15 (18.04), 2:3.49.1-1ubuntu1.8 (20.04) and 2:3.68-1ubuntu1.2 (21.10). The version in Ubuntu 22.04 is not vulnerable. ** Changed in: nss (Ubuntu) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to nss in Ubuntu. https://bugs.launchpad.net/bugs/1968922 Title: libnss3 is affected by CVE-2022-22747 Status in nss package in Ubuntu: Fix Released Bug description: libnss3 2:3.49.1-1ubuntu1.6 is affected by CVE-2022-22747. The entry for this CVE in the Ubuntu CVE tracker does not list this source package. This CVE was fixed in Debian 11 on January 23. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nss/+bug/1968922/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1968922] Re: libnss3 is affected by CVE-2022-22747
Version 2:3.49.1-1ubuntu1.7 was released after this bug was reported and does not contain a fix for this CVE. -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to nss in Ubuntu. https://bugs.launchpad.net/bugs/1968922 Title: libnss3 is affected by CVE-2022-22747 Status in nss package in Ubuntu: Confirmed Bug description: libnss3 2:3.49.1-1ubuntu1.6 is affected by CVE-2022-22747. The entry for this CVE in the Ubuntu CVE tracker does not list this source package. This CVE was fixed in Debian 11 on January 23. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nss/+bug/1968922/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1970961] Re: Version in Bionic has multiple vulnerabilities
** Changed in: faad2 (Ubuntu) Status: New => In Progress ** Changed in: faad2 (Ubuntu) Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara (luis220413) -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to faad2 in Ubuntu. https://bugs.launchpad.net/bugs/1970961 Title: Version in Bionic has multiple vulnerabilities Status in faad2 package in Ubuntu: In Progress Bug description: The version in Bionic is vulnerable to all CVEs listed below. The version in Focal is vulnerable to CVE-2021-32272, CVE-2021-32273, CVE-2021-32274, CVE-2021-32276, CVE-2021-32277 and CVE-2021-32278. Debian released an advisory on March 27. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/faad2/+bug/1970961/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1971001] Re: Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal, Impish and Jammy
Packages patched for CVE-2020-35522, CVE-2022-0561, CVE-2022-0562, CVE-2022-0865 and CVE-2022-0891 are available for Bionic, Focal and Impish at https://launchpad.net/~ubuntu-security- proposed/+archive/ubuntu/ppa. (Impish is not affected by CVE-2020-35522.) Please patch the other CVEs and release a patched version for Jammy. ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-35522 -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to tiff in Ubuntu. https://bugs.launchpad.net/bugs/1971001 Title: Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal, Impish and Jammy Status in tiff package in Ubuntu: In Progress Bug description: The versions in Trusty, Xenial, Bionic, Focal and Impish may be vulnerable to all CVEs below. The version in Jammy is vulnerable to CVE-2022-0865. Debian released an advisory on March 24. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/1971001/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1971001] Re: Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal, Impish and Jammy
** Changed in: tiff (Ubuntu) Status: Confirmed => In Progress -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to tiff in Ubuntu. https://bugs.launchpad.net/bugs/1971001 Title: Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal, Impish and Jammy Status in tiff package in Ubuntu: In Progress Bug description: The versions in Trusty, Xenial, Bionic, Focal and Impish may be vulnerable to all CVEs below. The version in Jammy is vulnerable to CVE-2022-0865. Debian released an advisory on March 24. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/1971001/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1971001] Re: Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal, Impish and Jammy
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-22844 ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to tiff in Ubuntu. https://bugs.launchpad.net/bugs/1971001 Title: Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal, Impish and Jammy Status in tiff package in Ubuntu: New Bug description: The versions in Trusty, Xenial, Bionic, Focal and Impish may be vulnerable to all CVEs below. The version in Jammy is vulnerable to CVE-2022-0865. Debian released an advisory on March 24. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/1971001/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1970961] Re: Version in Bionic has multiple vulnerabilities
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-32276 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-32277 ** Description changed: The version in Bionic is vulnerable to all CVEs listed below. + The version in Focal is vulnerable to CVE-2021-32272, CVE-2021-32273, + CVE-2021-32274, CVE-2021-32276, CVE-2021-32277 and CVE-2021-32278. + Debian released an advisory on March 27. ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-32278 ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to faad2 in Ubuntu. https://bugs.launchpad.net/bugs/1970961 Title: Version in Bionic has multiple vulnerabilities Status in faad2 package in Ubuntu: New Bug description: The version in Bionic is vulnerable to all CVEs listed below. The version in Focal is vulnerable to CVE-2021-32272, CVE-2021-32273, CVE-2021-32274, CVE-2021-32276, CVE-2021-32277 and CVE-2021-32278. Debian released an advisory on March 27. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/faad2/+bug/1970961/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1661719] Re: package libfaad2:amd64 2.8.0~cvs20150510-1 failed to install/upgrade: package libfaad2:amd64 is already installed and configured
This is a bug in apt. ** Also affects: apt (Ubuntu) Importance: Undecided Status: New ** No longer affects: apt (Ubuntu) ** Package changed: faad2 (Ubuntu) => apt (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to faad2 in Ubuntu. https://bugs.launchpad.net/bugs/1661719 Title: package libfaad2:amd64 2.8.0~cvs20150510-1 failed to install/upgrade: package libfaad2:amd64 is already installed and configured Status in apt package in Ubuntu: New Bug description: IDK issue says to report. ProblemType: Package DistroRelease: Ubuntu 16.04 Package: libfaad2:amd64 2.8.0~cvs20150510-1 ProcVersionSignature: Ubuntu 4.4.0-31.50-generic 4.4.13 Uname: Linux 4.4.0-31-generic x86_64 NonfreeKernelModules: nvidia_uvm nvidia_drm nvidia_modeset nvidia ApportVersion: 2.20.1-0ubuntu2.5 AptdaemonVersion: 1.1.1+bzr982-0ubuntu14 Architecture: amd64 Date: Fri Feb 3 23:18:42 2017 Dependencies: gcc-6-base 6.0.1-0ubuntu1 libc6 2.23-0ubuntu5 libgcc1 1:6.0.1-0ubuntu1 multiarch-support 2.23-0ubuntu5 DuplicateSignature: package:libfaad2:amd64:2.8.0~cvs20150510-1 Processing triggers for desktop-file-utils (0.22-1ubuntu5) ... dpkg: error processing package chromium-codecs-ffmpeg-extra (--configure): package chromium-codecs-ffmpeg-extra is already installed and configured ErrorMessage: package libfaad2:amd64 is already installed and configured InstallationDate: Installed on 2017-02-02 (0 days ago) InstallationMedia: Ubuntu 16.04.1 LTS "Xenial Xerus" - Release amd64 (20160719) RelatedPackageVersions: dpkg 1.18.4ubuntu1.1 apt 1.2.19 SourcePackage: faad2 Title: package libfaad2:amd64 2.8.0~cvs20150510-1 failed to install/upgrade: package libfaad2:amd64 is already installed and configured UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1661719/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1968922] Re: libnss3 is affected by CVE-2022-22747
Please release a fix. -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to nss in Ubuntu. https://bugs.launchpad.net/bugs/1968922 Title: libnss3 is affected by CVE-2022-22747 Status in nss package in Ubuntu: Confirmed Bug description: libnss3 2:3.49.1-1ubuntu1.6 is affected by CVE-2022-22747. The entry for this CVE in the Ubuntu CVE tracker does not list this source package. This CVE was fixed in Debian 11 on January 23. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nss/+bug/1968922/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp