[Touch-packages] [Bug 1889443] Re: "ValueError: ['separator'] has no binary content" when running `apport-unpack /var/crash/...`

2022-08-28 Thread Luís Cunha dos Reis Infante da Câmara
I believe this fix should be backported into Ubuntu 18.04, 20.04 and
22.04 through an SRU.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1889443

Title:
  "ValueError: ['separator'] has no binary content" when running
  `apport-unpack /var/crash/...`

Status in Apport:
  Fix Released
Status in apport package in Ubuntu:
  Fix Released

Bug description:
  The crash file I'm using is as-produced by the system (on groovy), and
  appears to have an empty value for separator:

  $ grep separator /var/crash/_usr_bin_neomutt.1000.crash
  separator:

  Traceback (most recent call last):
File "/usr/bin/apport-unpack", line 77, in 
  pr.extract_keys(f, bin_keys, dir)
File "/usr/lib/python3/dist-packages/problem_report.py", line 269, in 
extract_keys
  raise ValueError('%s has no binary content' %
  ValueError: ['separator'] has no binary content

  ProblemType: Bug
  DistroRelease: Ubuntu 20.10
  Package: apport 2.20.11-0ubuntu42
  ProcVersionSignature: Ubuntu 5.4.0-37.41-generic 5.4.41
  Uname: Linux 5.4.0-37-generic x86_64
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair nvidia_modeset 
nvidia
  ApportVersion: 2.20.11-0ubuntu42
  Architecture: amd64
  CasperMD5CheckResult: skip
  CrashReports:
   640:1000:117:1620030:2020-07-29 12:16:57.045274496 -0400:2020-07-29 
12:19:15.559243636 -0400:/var/crash/_usr_bin_neomutt.1000.crash
   640:1000:117:4399480:2020-07-23 10:30:21.433552906 -0400:2020-07-23 
10:30:18.921508067 -0400:/var/crash/_usr_bin_pavucontrol.1000.crash
   640:1000:117:29909:2020-07-29 12:19:15.603244279 -0400:2020-07-29 
12:19:15.603244279 -0400:/var/crash/_usr_bin_apport-unpack.1000.crash
  CurrentDesktop: i3
  Date: Wed Jul 29 12:22:54 2020
  InstallationDate: Installed on 2019-05-07 (448 days ago)
  InstallationMedia: Ubuntu 18.04.2 LTS "Bionic Beaver" - Release amd64 
(20190210)
  PackageArchitecture: all
  SourcePackage: apport
  UpgradeStatus: Upgraded to groovy on 2020-06-22 (37 days ago)

To manage notifications about this bug go to:
https://bugs.launchpad.net/apport/+bug/1889443/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1987706] Re: [FFe] Should preinstall network-manager-openconnect-gnome

2022-08-26 Thread Luís Cunha dos Reis Infante da Câmara
** Description changed:

  The ubuntu-desktop package should recommend network-manager-openconnect-
  gnome, that is undergoing a main inclusion review (MIR) at bug #1986592.
  
- I believe this deserves a feature freeze exception because it adds support to 
UBuntu for several types of 
- enterprise VPNs in wide use.
+ I believe this deserves a feature freeze exception because it adds
+ support to Ubuntu for several types of enterprise VPNs in wide use.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ubuntu-meta in Ubuntu.
https://bugs.launchpad.net/bugs/1987706

Title:
  [FFe] Should preinstall network-manager-openconnect-gnome

Status in ubuntu-meta package in Ubuntu:
  Incomplete

Bug description:
  The ubuntu-desktop package should recommend network-manager-
  openconnect-gnome, that is undergoing a main inclusion review (MIR) at
  bug #1986592.

  I believe this deserves a feature freeze exception because it adds
  support to Ubuntu for several types of enterprise VPNs in wide use.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-meta/+bug/1987706/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1987707] Re: [FFe] Should preinstall network-manager-openconnect-gnome

2022-08-25 Thread Luís Cunha dos Reis Infante da Câmara
** Description changed:

  The ubuntu-desktop package should recommend network-manager-openconnect-
  gnome, that is undergoing a main inclusion review (MIR) at bug #1986592.
  
- I believe this deserves a feature freeze exception because it adds support to 
UBuntu for several types of 
- enterprise VPNs in wide use.
+ I believe this deserves a feature freeze exception because it adds
+ support to Ubuntu for several types of enterprise VPNs in wide use.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ubuntu-meta in Ubuntu.
https://bugs.launchpad.net/bugs/1987707

Title:
  [FFe] Should preinstall network-manager-openconnect-gnome

Status in ubuntu-meta package in Ubuntu:
  New

Bug description:
  The ubuntu-desktop package should recommend network-manager-
  openconnect-gnome, that is undergoing a main inclusion review (MIR) at
  bug #1986592.

  I believe this deserves a feature freeze exception because it adds
  support to Ubuntu for several types of enterprise VPNs in wide use.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-meta/+bug/1987707/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1987706] [NEW] [FFe] Should preinstall network-manager-openconnect-gnome

2022-08-25 Thread Luís Cunha dos Reis Infante da Câmara
Public bug reported:

The ubuntu-desktop package should recommend network-manager-openconnect-
gnome, that is undergoing a main inclusion review (MIR) at bug #1986592.

I believe this deserves a feature freeze exception because it adds support to 
UBuntu for several types of 
enterprise VPNs in wide use.

** Affects: ubuntu-meta (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ubuntu-meta in Ubuntu.
https://bugs.launchpad.net/bugs/1987706

Title:
  [FFe] Should preinstall network-manager-openconnect-gnome

Status in ubuntu-meta package in Ubuntu:
  New

Bug description:
  The ubuntu-desktop package should recommend network-manager-
  openconnect-gnome, that is undergoing a main inclusion review (MIR) at
  bug #1986592.

  I believe this deserves a feature freeze exception because it adds support to 
UBuntu for several types of 
  enterprise VPNs in wide use.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-meta/+bug/1987706/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1987707] [NEW] [FFe] Should preinstall network-manager-openconnect-gnome

2022-08-25 Thread Luís Cunha dos Reis Infante da Câmara
Public bug reported:

The ubuntu-desktop package should recommend network-manager-openconnect-
gnome, that is undergoing a main inclusion review (MIR) at bug #1986592.

I believe this deserves a feature freeze exception because it adds
support to Ubuntu for several types of enterprise VPNs in wide use.

** Affects: ubuntu-meta (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ubuntu-meta in Ubuntu.
https://bugs.launchpad.net/bugs/1987707

Title:
  [FFe] Should preinstall network-manager-openconnect-gnome

Status in ubuntu-meta package in Ubuntu:
  New

Bug description:
  The ubuntu-desktop package should recommend network-manager-
  openconnect-gnome, that is undergoing a main inclusion review (MIR) at
  bug #1986592.

  I believe this deserves a feature freeze exception because it adds
  support to Ubuntu for several types of enterprise VPNs in wide use.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-meta/+bug/1987707/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1987336] [NEW] Multiple vulnerabilities in Focal

2022-08-22 Thread Luís Cunha dos Reis Infante da Câmara
*** This bug is a security vulnerability ***

Public security bug reported:

The version in Ubuntu 20.04 is vulnerable to CVE-2020-13962,
CVE-2020-17507 and CVE-2022-25255.

I will provide a debdiff in this week.

** Affects: qtbase-opensource-src (Ubuntu)
 Importance: Undecided
 Assignee: Luís Cunha dos Reis Infante da Câmara (luis220413)
 Status: New

** Information type changed from Private Security to Public Security

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-13962

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-17507

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-25255

** Changed in: qtbase-opensource-src (Ubuntu)
 Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara 
(luis220413)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to qtbase-opensource-src in
Ubuntu.
https://bugs.launchpad.net/bugs/1987336

Title:
  Multiple vulnerabilities in Focal

Status in qtbase-opensource-src package in Ubuntu:
  New

Bug description:
  The version in Ubuntu 20.04 is vulnerable to CVE-2020-13962,
  CVE-2020-17507 and CVE-2022-25255.

  I will provide a debdiff in this week.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qtbase-opensource-src/+bug/1987336/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1698755] Re: package libqt5gui5:amd64 5.5.1+dfsg-16ubuntu7.5 failed to install/upgrade: package libqt5gui5:amd64 is not ready for configuration cannot configure (current status '

2022-08-22 Thread Luís Cunha dos Reis Infante da Câmara
This is most likely an hardware issue. Please run the following command
and retry:

$ sudo dpkg --configure -a

It is recommended that you upgrade to (or freshly install) a version of
Ubuntu under standard support, even though you are covered by ESM if
your machine has an Ubuntu Advantage subscription.

** Changed in: qtbase-opensource-src (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to qtbase-opensource-src in
Ubuntu.
https://bugs.launchpad.net/bugs/1698755

Title:
  package libqt5gui5:amd64 5.5.1+dfsg-16ubuntu7.5 failed to
  install/upgrade: package libqt5gui5:amd64 is not ready for
  configuration  cannot configure (current status 'half-installed')

Status in qtbase-opensource-src package in Ubuntu:
  Incomplete

Bug description:
  0.8.9-0ubuntu0.16.04.1

* Backport to xenial.
  - Fixes API connectivitity issues (LP: #1688056)

  0.8.9-1

* New upstream release.

  0.8.8-1

[ Mateusz Łukasik ]
* New upstream release. 
  - Drop 01_update-yr.no-url.patch -- included upstream.

  0.8.7-3

* debian/patches:
  - fix obvious typo in 01_update-yr.no-url.

  0.8.7-2

* debian/patches:
  - 01_update-yr.no-url added, update API url for Yr.no serice.

  0.8.7-1

[ Mateusz Łukasik ]
* New upstream release. (Closes: #774101)
   * debian/control:
  - Bump standards version to 3.9.8.
  - Use secured link for Vcs-Browser.
* debian/watch:
  - Bump to version 4.

  ProblemType: Package
  DistroRelease: Ubuntu 16.04
  Package: libqt5gui5:amd64 5.5.1+dfsg-16ubuntu7.5
  ProcVersionSignature: Ubuntu 4.8.0-54.57~16.04.1-generic 4.8.17
  Uname: Linux 4.8.0-54-generic x86_64
  ApportVersion: 2.20.1-0ubuntu2.6
  Architecture: amd64
  Date: Mon Jun 19 10:06:12 2017
  DuplicateSignature:
   package:libqt5gui5:amd64:5.5.1+dfsg-16ubuntu7.5
   Setting up libcapnp-0.5.3:amd64 (0.5.3-2ubuntu1) ...
   dpkg: error processing package libqt5gui5:amd64 (--configure):
package libqt5gui5:amd64 is not ready for configuration
  ErrorMessage: package libqt5gui5:amd64 is not ready for configuration  cannot 
configure (current status 'half-installed')
  InstallationDate: Installed on 2017-03-26 (84 days ago)
  InstallationMedia: Xubuntu 16.04.2 LTS "Xenial Xerus" - Release amd64 
(20170215)
  RelatedPackageVersions:
   dpkg 1.18.4ubuntu1.2
   apt  1.2.20
  SourcePackage: qtbase-opensource-src
  Title: package libqt5gui5:amd64 5.5.1+dfsg-16ubuntu7.5 failed to 
install/upgrade: package libqt5gui5:amd64 is not ready for configuration  
cannot configure (current status 'half-installed')
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qtbase-opensource-src/+bug/1698755/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1982652] Re: ddebs.ubuntu.com is down

2022-08-01 Thread Luís Cunha dos Reis Infante da Câmara
** Changed in: apt (Ubuntu)
   Status: Fix Released => Confirmed

** Summary changed:

- ddebs.ubuntu.com is down
+ ddebs.ubuntu.com is intermittently down

** Description changed:

  When running apt-get update (a few days ago and a few minutes ago),
- ddebs.ubuntu.com is down, responding with HTTP 503:
+ ddebs.ubuntu.com is sometimes down, responding with HTTP 503:
  
  W: Failed to fetch http://ddebs.ubuntu.com/dists/focal/InRelease  503  
Service Unavailable [IP: 185.125.190.18 80]
  W: Failed to fetch http://ddebs.ubuntu.com/dists/focal-updates/InRelease  503 
 Service Unavailable [IP: 185.125.190.18 80]
  W: Some index files failed to download. They have been ignored, or old ones 
used instead.
+ 
+ This is an intermittent issue.
  
  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: apt 2.0.9
  ProcVersionSignature: Ubuntu 5.15.0-41.44~20.04.1-generic 5.15.39
  Uname: Linux 5.15.0-41-generic x86_64
  ApportVersion: 2.20.11-0ubuntu27.24
  Architecture: amd64
  CasperMD5CheckResult: skip
  CurrentDesktop: ubuntu:GNOME
  Date: Sat Jul 23 07:54:35 2022
  InstallationDate: Installed on 2022-04-26 (87 days ago)
  InstallationMedia: Ubuntu 20.04.4 LTS "Focal Fossa" - Release amd64 (20220223)
  SourcePackage: apt
  UpgradeStatus: No upgrade log present (probably fresh install)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1982652

Title:
  ddebs.ubuntu.com is intermittently down

Status in apt package in Ubuntu:
  Confirmed

Bug description:
  When running apt-get update (a few days ago and a few minutes ago),
  ddebs.ubuntu.com is sometimes down, responding with HTTP 503:

  W: Failed to fetch http://ddebs.ubuntu.com/dists/focal/InRelease  503  
Service Unavailable [IP: 185.125.190.18 80]
  W: Failed to fetch http://ddebs.ubuntu.com/dists/focal-updates/InRelease  503 
 Service Unavailable [IP: 185.125.190.18 80]
  W: Some index files failed to download. They have been ignored, or old ones 
used instead.

  This is an intermittent issue.

  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: apt 2.0.9
  ProcVersionSignature: Ubuntu 5.15.0-41.44~20.04.1-generic 5.15.39
  Uname: Linux 5.15.0-41-generic x86_64
  ApportVersion: 2.20.11-0ubuntu27.24
  Architecture: amd64
  CasperMD5CheckResult: skip
  CurrentDesktop: ubuntu:GNOME
  Date: Sat Jul 23 07:54:35 2022
  InstallationDate: Installed on 2022-04-26 (87 days ago)
  InstallationMedia: Ubuntu 20.04.4 LTS "Focal Fossa" - Release amd64 (20220223)
  SourcePackage: apt
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1982652/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1330770] Re: click packages rely upon tls for integrity and authenticity

2022-07-26 Thread Luís Cunha dos Reis Infante da Câmara
Fixed in https://gitlab.com/ubports/development/core/lomiri-download-
manager/-/commit/df3665685da5cfb559a06016d4e0339c29b903e1 (2015), that
first appeared in version 0.9+15.10.20150723.2-0ubuntu1.

** Changed in: ubuntu-download-manager (Ubuntu)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ubuntu-download-manager in
Ubuntu.
https://bugs.launchpad.net/bugs/1330770

Title:
  click packages rely upon tls for integrity and authenticity

Status in Canonical System Image:
  Fix Released
Status in Click Package Index:
  Fix Released
Status in Software Center Agent:
  Fix Released
Status in click package in Ubuntu:
  Fix Released
Status in ubuntu-download-manager package in Ubuntu:
  Fix Released
Status in ubuntu-system-settings package in Ubuntu:
  Fix Released
Status in unity-scope-click package in Ubuntu:
  Fix Released
Status in ubuntu-download-manager source package in Vivid:
  New

Bug description:
  Hello, I just completed a quick review of the click source and the
  unity-scope-click source and behaviours, and found some opportunities
  for improvement.

  Debian, and Ubuntu, rely upon signed repository files with
  cryptographic hashes of packages to provide both integrity and
  authenticity checks for the packages hosted on that repository.

  The click framework and the unity-scope-click discovery and
  installation tool do not use signed repository files, nor do they have
  signatures of any sort on downloaded packages. The only integrity and
  authenticity checks are provided by the use of HTTPS.  The click
  verify command will check files within the archive against MD5sums
  stored inside the archive but the click verify command is not used
  during package installation. (This is suitable for validating
  integrity against accidental changes only.)

  While it appears that unity-scope-click properly uses HTTPS to
  download package metadata and packages, HTTPS alone is insufficient
  for our needs:

  - Someone in a position to create new certificates at any of several
  hundred certificate authorities could create certificates purporting
  to be our update servers. This actual problem has been discovered in
  the wild with several certificate authorities issuing wild-card
  certificates or even certificates with signing authority.

  - X.509 is extremely complicated; TLS is extremely complicated. Flaws
  in both are inevitable.

  - HTTPS prevents the use of caching.

  - HTTPS only 'works' for data-in-motion; it is useless for data-at-
  rest integrity and authenticity checks.

  I have not yet reviewed the tools that application authors will use to
  upload their packages to our distribution servers but note in passing
  that most of these issues are also issues for adding packages to our
  update servers -- packages in flight within our network can be
  corrupted for many reasons, packages on disk can be corrupted for many
  reasons. A signature mechanism can protect against internal network
  faults, storage faults, and provide assurance months or years later
  that an uploaded package was uploaded by someone in control of a
  corresponding private key.

  Thanks

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-devices-system-image/+bug/1330770/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1982652] Re: ddebs.ubuntu.com is down

2022-07-25 Thread Luís Cunha dos Reis Infante da Câmara
Thanks for confirming this bug! Next time you encounter the issue
described in a bug report, please mark yourself as affected by the bug
report, that will automatically change the bug status from New to
Confirmed.

I will report this issue to the #ubuntu IRC channel.

** Changed in: apt (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1982652

Title:
  ddebs.ubuntu.com is down

Status in apt package in Ubuntu:
  Confirmed

Bug description:
  When running apt-get update (a few days ago and a few minutes ago),
  ddebs.ubuntu.com is down, responding with HTTP 503:

  W: Failed to fetch http://ddebs.ubuntu.com/dists/focal/InRelease  503  
Service Unavailable [IP: 185.125.190.18 80]
  W: Failed to fetch http://ddebs.ubuntu.com/dists/focal-updates/InRelease  503 
 Service Unavailable [IP: 185.125.190.18 80]
  W: Some index files failed to download. They have been ignored, or old ones 
used instead.

  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: apt 2.0.9
  ProcVersionSignature: Ubuntu 5.15.0-41.44~20.04.1-generic 5.15.39
  Uname: Linux 5.15.0-41-generic x86_64
  ApportVersion: 2.20.11-0ubuntu27.24
  Architecture: amd64
  CasperMD5CheckResult: skip
  CurrentDesktop: ubuntu:GNOME
  Date: Sat Jul 23 07:54:35 2022
  InstallationDate: Installed on 2022-04-26 (87 days ago)
  InstallationMedia: Ubuntu 20.04.4 LTS "Focal Fossa" - Release amd64 (20220223)
  SourcePackage: apt
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1982652/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1982652] [NEW] ddebs.ubuntu.com is down

2022-07-23 Thread Luís Cunha dos Reis Infante da Câmara
Public bug reported:

When running apt-get update (a few days ago and a few minutes ago),
ddebs.ubuntu.com is down, responding with HTTP 503:

W: Failed to fetch http://ddebs.ubuntu.com/dists/focal/InRelease  503  Service 
Unavailable [IP: 185.125.190.18 80]
W: Failed to fetch http://ddebs.ubuntu.com/dists/focal-updates/InRelease  503  
Service Unavailable [IP: 185.125.190.18 80]
W: Some index files failed to download. They have been ignored, or old ones 
used instead.

ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: apt 2.0.9
ProcVersionSignature: Ubuntu 5.15.0-41.44~20.04.1-generic 5.15.39
Uname: Linux 5.15.0-41-generic x86_64
ApportVersion: 2.20.11-0ubuntu27.24
Architecture: amd64
CasperMD5CheckResult: skip
CurrentDesktop: ubuntu:GNOME
Date: Sat Jul 23 07:54:35 2022
InstallationDate: Installed on 2022-04-26 (87 days ago)
InstallationMedia: Ubuntu 20.04.4 LTS "Focal Fossa" - Release amd64 (20220223)
SourcePackage: apt
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: apt (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug focal

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1982652

Title:
  ddebs.ubuntu.com is down

Status in apt package in Ubuntu:
  New

Bug description:
  When running apt-get update (a few days ago and a few minutes ago),
  ddebs.ubuntu.com is down, responding with HTTP 503:

  W: Failed to fetch http://ddebs.ubuntu.com/dists/focal/InRelease  503  
Service Unavailable [IP: 185.125.190.18 80]
  W: Failed to fetch http://ddebs.ubuntu.com/dists/focal-updates/InRelease  503 
 Service Unavailable [IP: 185.125.190.18 80]
  W: Some index files failed to download. They have been ignored, or old ones 
used instead.

  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: apt 2.0.9
  ProcVersionSignature: Ubuntu 5.15.0-41.44~20.04.1-generic 5.15.39
  Uname: Linux 5.15.0-41-generic x86_64
  ApportVersion: 2.20.11-0ubuntu27.24
  Architecture: amd64
  CasperMD5CheckResult: skip
  CurrentDesktop: ubuntu:GNOME
  Date: Sat Jul 23 07:54:35 2022
  InstallationDate: Installed on 2022-04-26 (87 days ago)
  InstallationMedia: Ubuntu 20.04.4 LTS "Focal Fossa" - Release amd64 (20220223)
  SourcePackage: apt
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1982652/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1982430] [NEW] nm's -U flag does not work

2022-07-20 Thread Luís Cunha dos Reis Infante da Câmara
Public bug reported:

nm appears to behave as if the -U flag took an argument:

$ nm -DU /usr/lib/x86_64-linux-gnu/libc.so.6
nm: 'a.out': No such file
$ nm -DU . /usr/lib/x86_64-linux-gnu/libc.so.6
[3006 lines]

ProblemType: Bug
DistroRelease: Ubuntu 22.10
Package: binutils 2.38.90.20220713-2ubuntu1
ProcVersionSignature: Ubuntu 5.15.0-27.28-generic 5.15.30
Uname: Linux 5.15.0-27-generic x86_64
ApportVersion: 2.22.0-0ubuntu4
Architecture: amd64
CasperMD5CheckResult: pass
CurrentDesktop: MATE
Date: Wed Jul 20 23:53:19 2022
InstallationDate: Installed on 2022-06-26 (24 days ago)
InstallationMedia: Ubuntu 22.10 "Kinetic Kudu" - Alpha amd64 (20220624)
SourcePackage: binutils
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: binutils (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug kinetic

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to binutils in Ubuntu.
https://bugs.launchpad.net/bugs/1982430

Title:
  nm's -U flag does not work

Status in binutils package in Ubuntu:
  New

Bug description:
  nm appears to behave as if the -U flag took an argument:

  $ nm -DU /usr/lib/x86_64-linux-gnu/libc.so.6
  nm: 'a.out': No such file
  $ nm -DU . /usr/lib/x86_64-linux-gnu/libc.so.6
  [3006 lines]

  ProblemType: Bug
  DistroRelease: Ubuntu 22.10
  Package: binutils 2.38.90.20220713-2ubuntu1
  ProcVersionSignature: Ubuntu 5.15.0-27.28-generic 5.15.30
  Uname: Linux 5.15.0-27-generic x86_64
  ApportVersion: 2.22.0-0ubuntu4
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: MATE
  Date: Wed Jul 20 23:53:19 2022
  InstallationDate: Installed on 2022-06-26 (24 days ago)
  InstallationMedia: Ubuntu 22.10 "Kinetic Kudu" - Alpha amd64 (20220624)
  SourcePackage: binutils
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1982430/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1982422] [NEW] Multiple vulnerabilities in Bionic, Focal and Jammy

2022-07-20 Thread Luís Cunha dos Reis Infante da Câmara
*** This bug is a security vulnerability ***

Public security bug reported:

The version in Bionic is vulnerable to all CVEs listed below.

The versions in Focal and Jammy are vulnerable to CVE-2022-30067 and
CVE-2022-32990.

Please publish patched packages.

** Affects: gimp (Ubuntu)
 Importance: Undecided
 Status: New

** Information type changed from Private Security to Public Security

** Also affects: gimp (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: gtk+2.0 (Ubuntu)

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-30067

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-32990

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12713

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gtk+2.0 in Ubuntu.
https://bugs.launchpad.net/bugs/1982422

Title:
  Multiple vulnerabilities in Bionic, Focal and Jammy

Status in gimp package in Ubuntu:
  New

Bug description:
  The version in Bionic is vulnerable to all CVEs listed below.

  The versions in Focal and Jammy are vulnerable to CVE-2022-30067 and
  CVE-2022-32990.

  Please publish patched packages.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gimp/+bug/1982422/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 283115] Re: Gimp: toolbox windows can't be minimized

2022-07-20 Thread Luís Cunha dos Reis Infante da Câmara
** Changed in: gimp (Ubuntu)
   Status: Confirmed => Fix Released

** Also affects: gtk+2.0 (Ubuntu)
   Importance: Undecided
   Status: New

** Bug watch added: bugzilla.gnome.org/ #586664
   https://bugzilla.gnome.org/show_bug.cgi?id=586664

** Also affects: gtk via
   https://bugzilla.gnome.org/show_bug.cgi?id=586664
   Importance: Unknown
   Status: Unknown

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gtk+2.0 in Ubuntu.
https://bugs.launchpad.net/bugs/283115

Title:
  Gimp: toolbox windows can't be minimized

Status in The Gimp:
  Fix Released
Status in GTK+:
  Unknown
Status in gimp package in Ubuntu:
  Fix Released
Status in gtk+2.0 package in Ubuntu:
  New

Bug description:
  gimp 2.6 in intrepid:
  it is impossible to minimize toolbar windows; they have only a x-Button to 
close

  ideally, these windows should be minimized automatically when the
  (last) Gimp image window is minimized

  Update
  While waiting, I designed some sort of workaround :
  Gnome>System>Preferences>Windows>Double-click titlebar>Roll up

To manage notifications about this bug go to:
https://bugs.launchpad.net/gimp/+bug/283115/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1982198] [NEW] apt update: Can not add an empty (zero-length) key to the cache

2022-07-19 Thread Luís Cunha dos Reis Infante da Câmara
Public bug reported:

When running sudo apt update, I get the following warning after the
"Fetched" message:

Can not add an empty (zero-length) key to the cache

ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: apt 2.0.9
ProcVersionSignature: Ubuntu 5.15.0-41.44~20.04.1-generic 5.15.39
Uname: Linux 5.15.0-41-generic x86_64
ApportVersion: 2.20.11-0ubuntu27.24
Architecture: amd64
CasperMD5CheckResult: skip
CurrentDesktop: ubuntu:GNOME
Date: Tue Jul 19 16:44:36 2022
InstallationDate: Installed on 2022-04-26 (84 days ago)
InstallationMedia: Ubuntu 20.04.4 LTS "Focal Fossa" - Release amd64 (20220223)
SourcePackage: apt
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: apt (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug focal

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1982198

Title:
  apt update: Can not add an empty (zero-length) key to the cache

Status in apt package in Ubuntu:
  New

Bug description:
  When running sudo apt update, I get the following warning after the
  "Fetched" message:

  Can not add an empty (zero-length) key to the cache

  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: apt 2.0.9
  ProcVersionSignature: Ubuntu 5.15.0-41.44~20.04.1-generic 5.15.39
  Uname: Linux 5.15.0-41-generic x86_64
  ApportVersion: 2.20.11-0ubuntu27.24
  Architecture: amd64
  CasperMD5CheckResult: skip
  CurrentDesktop: ubuntu:GNOME
  Date: Tue Jul 19 16:44:36 2022
  InstallationDate: Installed on 2022-04-26 (84 days ago)
  InstallationMedia: Ubuntu 20.04.4 LTS "Focal Fossa" - Release amd64 (20220223)
  SourcePackage: apt
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1982198/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1981874] [NEW] gdk_wayland_window_handle_configure_popup: assertion 'impl->transient_for' failed

2022-07-16 Thread Luís Cunha dos Reis Infante da Câmara
Public bug reported:

When running update-manager in the command line, viewing the changelogs
for some updates and installing all updates, update-manager outputs the
following to standard error.

Gdk-Message: 07:32:40.867: Window 0x559accd09420 is a temporary window
without parent, application will not be able to position it on screen.

(update-manager:30618): Gdk-CRITICAL **: 07:32:40.878: 
gdk_wayland_window_handle_configure_popup: assertion 'impl->transient_for' 
failed
Gdk-Message: 07:32:41.983: Window 0x559acd626210 is a temporary window without 
parent, application will not be able to position it on screen.

(update-manager:30618): Gdk-CRITICAL **: 07:32:41.992:
gdk_wayland_window_handle_configure_popup: assertion
'impl->transient_for' failed

ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: libgtk-3-0 3.24.33-1ubuntu2
ProcVersionSignature: Ubuntu 5.15.0-41.44-generic 5.15.39
Uname: Linux 5.15.0-41-generic x86_64
ApportVersion: 2.20.11-0ubuntu82.1
Architecture: amd64
CasperMD5CheckResult: pass
CurrentDesktop: ubuntu:GNOME
Date: Sat Jul 16 07:37:26 2022
InstallationDate: Installed on 2022-05-04 (72 days ago)
InstallationMedia: Ubuntu 22.04 LTS "Jammy Jellyfish" - Release amd64 (20220419)
SourcePackage: gtk+3.0
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: gtk+3.0 (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug jammy wayland-session

** Summary changed:

- gdk_wayland_window_handle_configure_popup: assertion 'impl->transient_for' 
failed Gdk-Message: 07:32:41.983: Window 0x559acd626210 is a temporary window 
without parent, application will not be able to position it on screen.  
(update-manager:30618): Gdk-CRITICAL **: 07:32:41.992: 
gdk_wayland_window_handle_configure_popup: assertion 'impl->transient_for' 
failed
+ gdk_wayland_window_handle_configure_popup: assertion 'impl->transient_for' 
failed

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gtk+3.0 in Ubuntu.
https://bugs.launchpad.net/bugs/1981874

Title:
  gdk_wayland_window_handle_configure_popup: assertion
  'impl->transient_for' failed

Status in gtk+3.0 package in Ubuntu:
  New

Bug description:
  When running update-manager in the command line, viewing the
  changelogs for some updates and installing all updates, update-manager
  outputs the following to standard error.

  Gdk-Message: 07:32:40.867: Window 0x559accd09420 is a temporary window
  without parent, application will not be able to position it on screen.

  (update-manager:30618): Gdk-CRITICAL **: 07:32:40.878: 
gdk_wayland_window_handle_configure_popup: assertion 'impl->transient_for' 
failed
  Gdk-Message: 07:32:41.983: Window 0x559acd626210 is a temporary window 
without parent, application will not be able to position it on screen.

  (update-manager:30618): Gdk-CRITICAL **: 07:32:41.992:
  gdk_wayland_window_handle_configure_popup: assertion
  'impl->transient_for' failed

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: libgtk-3-0 3.24.33-1ubuntu2
  ProcVersionSignature: Ubuntu 5.15.0-41.44-generic 5.15.39
  Uname: Linux 5.15.0-41-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82.1
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Sat Jul 16 07:37:26 2022
  InstallationDate: Installed on 2022-05-04 (72 days ago)
  InstallationMedia: Ubuntu 22.04 LTS "Jammy Jellyfish" - Release amd64 
(20220419)
  SourcePackage: gtk+3.0
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gtk+3.0/+bug/1981874/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1971001] Re: Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal and Jammy

2022-07-15 Thread Luís Cunha dos Reis Infante da Câmara
Impish reached end-of-life yesterday.

** Summary changed:

- Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal, Impish and Jammy
+ Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal and Jammy

** Description changed:

- The versions in Trusty, Xenial, Bionic, Focal, Impish and Jammy may be
+ The versions in Trusty, Xenial, Bionic, Focal and Jammy may be
  vulnerable to all CVEs below.
  
  Debian released an advisory on March 24.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to tiff in Ubuntu.
https://bugs.launchpad.net/bugs/1971001

Title:
  Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal and Jammy

Status in tiff package in Ubuntu:
  In Progress

Bug description:
  The versions in Trusty, Xenial, Bionic, Focal and Jammy may be
  vulnerable to all CVEs below.

  Debian released an advisory on March 24.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/1971001/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1968922] Re: libnss3 is affected by CVE-2022-22747

2022-07-11 Thread Luís Cunha dos Reis Infante da Câmara
Fixed in versions 2:3.35-2ubuntu2.15 (18.04), 2:3.49.1-1ubuntu1.8
(20.04) and 2:3.68-1ubuntu1.2 (21.10). The version in Ubuntu 22.04 is
not vulnerable.

** Changed in: nss (Ubuntu)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/1968922

Title:
  libnss3 is affected by CVE-2022-22747

Status in nss package in Ubuntu:
  Fix Released

Bug description:
  libnss3 2:3.49.1-1ubuntu1.6 is affected by CVE-2022-22747.

  The entry for this CVE in the Ubuntu CVE tracker does not list this
  source package.

  This CVE was fixed in Debian 11 on January 23.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nss/+bug/1968922/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1968922] Re: libnss3 is affected by CVE-2022-22747

2022-06-20 Thread Luís Cunha dos Reis Infante da Câmara
Version 2:3.49.1-1ubuntu1.7 was released after this bug was reported and
does not contain a fix for this CVE.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/1968922

Title:
  libnss3 is affected by CVE-2022-22747

Status in nss package in Ubuntu:
  Confirmed

Bug description:
  libnss3 2:3.49.1-1ubuntu1.6 is affected by CVE-2022-22747.

  The entry for this CVE in the Ubuntu CVE tracker does not list this
  source package.

  This CVE was fixed in Debian 11 on January 23.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nss/+bug/1968922/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1970961] Re: Version in Bionic has multiple vulnerabilities

2022-06-01 Thread Luís Cunha dos Reis Infante da Câmara
** Changed in: faad2 (Ubuntu)
   Status: New => In Progress

** Changed in: faad2 (Ubuntu)
 Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara 
(luis220413)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to faad2 in Ubuntu.
https://bugs.launchpad.net/bugs/1970961

Title:
  Version in Bionic has multiple vulnerabilities

Status in faad2 package in Ubuntu:
  In Progress

Bug description:
  The version in Bionic is vulnerable to all CVEs listed below.

  The version in Focal is vulnerable to CVE-2021-32272, CVE-2021-32273,
  CVE-2021-32274, CVE-2021-32276, CVE-2021-32277 and CVE-2021-32278.

  Debian released an advisory on March 27.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/faad2/+bug/1970961/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1971001] Re: Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal, Impish and Jammy

2022-05-12 Thread Luís Cunha dos Reis Infante da Câmara
Packages patched for CVE-2020-35522, CVE-2022-0561, CVE-2022-0562,
CVE-2022-0865 and CVE-2022-0891 are available for Bionic, Focal and
Impish at https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa. (Impish is not affected by
CVE-2020-35522.)

Please patch the other CVEs and release a patched version for Jammy.

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-35522

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to tiff in Ubuntu.
https://bugs.launchpad.net/bugs/1971001

Title:
  Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal, Impish and
  Jammy

Status in tiff package in Ubuntu:
  In Progress

Bug description:
  The versions in Trusty, Xenial, Bionic, Focal and Impish may be
  vulnerable to all CVEs below.

  The version in Jammy is vulnerable to CVE-2022-0865.

  Debian released an advisory on March 24.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/1971001/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1971001] Re: Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal, Impish and Jammy

2022-05-12 Thread Luís Cunha dos Reis Infante da Câmara
** Changed in: tiff (Ubuntu)
   Status: Confirmed => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to tiff in Ubuntu.
https://bugs.launchpad.net/bugs/1971001

Title:
  Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal, Impish and
  Jammy

Status in tiff package in Ubuntu:
  In Progress

Bug description:
  The versions in Trusty, Xenial, Bionic, Focal and Impish may be
  vulnerable to all CVEs below.

  The version in Jammy is vulnerable to CVE-2022-0865.

  Debian released an advisory on March 24.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/1971001/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1971001] Re: Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal, Impish and Jammy

2022-04-29 Thread Luís Cunha dos Reis Infante da Câmara
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-22844

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to tiff in Ubuntu.
https://bugs.launchpad.net/bugs/1971001

Title:
  Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal, Impish and
  Jammy

Status in tiff package in Ubuntu:
  New

Bug description:
  The versions in Trusty, Xenial, Bionic, Focal and Impish may be
  vulnerable to all CVEs below.

  The version in Jammy is vulnerable to CVE-2022-0865.

  Debian released an advisory on March 24.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/1971001/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1970961] Re: Version in Bionic has multiple vulnerabilities

2022-04-29 Thread Luís Cunha dos Reis Infante da Câmara
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-32276

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-32277

** Description changed:

  The version in Bionic is vulnerable to all CVEs listed below.
  
+ The version in Focal is vulnerable to CVE-2021-32272, CVE-2021-32273,
+ CVE-2021-32274, CVE-2021-32276, CVE-2021-32277 and CVE-2021-32278.
+ 
  Debian released an advisory on March 27.

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-32278

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to faad2 in Ubuntu.
https://bugs.launchpad.net/bugs/1970961

Title:
  Version in Bionic has multiple vulnerabilities

Status in faad2 package in Ubuntu:
  New

Bug description:
  The version in Bionic is vulnerable to all CVEs listed below.

  The version in Focal is vulnerable to CVE-2021-32272, CVE-2021-32273,
  CVE-2021-32274, CVE-2021-32276, CVE-2021-32277 and CVE-2021-32278.

  Debian released an advisory on March 27.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/faad2/+bug/1970961/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1661719] Re: package libfaad2:amd64 2.8.0~cvs20150510-1 failed to install/upgrade: package libfaad2:amd64 is already installed and configured

2022-04-29 Thread Luís Cunha dos Reis Infante da Câmara
This is a bug in apt.

** Also affects: apt (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: apt (Ubuntu)

** Package changed: faad2 (Ubuntu) => apt (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to faad2 in Ubuntu.
https://bugs.launchpad.net/bugs/1661719

Title:
  package libfaad2:amd64 2.8.0~cvs20150510-1 failed to install/upgrade:
  package libfaad2:amd64 is already installed and configured

Status in apt package in Ubuntu:
  New

Bug description:
  IDK issue says to report.

  ProblemType: Package
  DistroRelease: Ubuntu 16.04
  Package: libfaad2:amd64 2.8.0~cvs20150510-1
  ProcVersionSignature: Ubuntu 4.4.0-31.50-generic 4.4.13
  Uname: Linux 4.4.0-31-generic x86_64
  NonfreeKernelModules: nvidia_uvm nvidia_drm nvidia_modeset nvidia
  ApportVersion: 2.20.1-0ubuntu2.5
  AptdaemonVersion: 1.1.1+bzr982-0ubuntu14
  Architecture: amd64
  Date: Fri Feb  3 23:18:42 2017
  Dependencies:
   gcc-6-base 6.0.1-0ubuntu1
   libc6 2.23-0ubuntu5
   libgcc1 1:6.0.1-0ubuntu1
   multiarch-support 2.23-0ubuntu5
  DuplicateSignature:
   package:libfaad2:amd64:2.8.0~cvs20150510-1
   Processing triggers for desktop-file-utils (0.22-1ubuntu5) ...
   dpkg: error processing package chromium-codecs-ffmpeg-extra (--configure):
package chromium-codecs-ffmpeg-extra is already installed and configured
  ErrorMessage: package libfaad2:amd64 is already installed and configured
  InstallationDate: Installed on 2017-02-02 (0 days ago)
  InstallationMedia: Ubuntu 16.04.1 LTS "Xenial Xerus" - Release amd64 
(20160719)
  RelatedPackageVersions:
   dpkg 1.18.4ubuntu1.1
   apt  1.2.19
  SourcePackage: faad2
  Title: package libfaad2:amd64 2.8.0~cvs20150510-1 failed to install/upgrade: 
package libfaad2:amd64 is already installed and configured
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1661719/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1968922] Re: libnss3 is affected by CVE-2022-22747

2022-04-23 Thread Luís Cunha dos Reis Infante da Câmara
Please release a fix.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/1968922

Title:
  libnss3 is affected by CVE-2022-22747

Status in nss package in Ubuntu:
  Confirmed

Bug description:
  libnss3 2:3.49.1-1ubuntu1.6 is affected by CVE-2022-22747.

  The entry for this CVE in the Ubuntu CVE tracker does not list this
  source package.

  This CVE was fixed in Debian 11 on January 23.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nss/+bug/1968922/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp