[Desktop-packages] [Bug 1970783] Re: Multiple vulnerabilities in Bionic
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-32893 ** Description changed: The version in Bionic has multiple vulnerabilities. - Please backport version 2.36.0 or at least the security fixes in that + Please backport version 2.36.7 or at least the security fixes in that version. Upstream and Debian have released advisories on April 8. -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to webkit2gtk in Ubuntu. https://bugs.launchpad.net/bugs/1970783 Title: Multiple vulnerabilities in Bionic Status in webkit2gtk package in Ubuntu: In Progress Bug description: The version in Bionic has multiple vulnerabilities. Please backport version 2.36.7 or at least the security fixes in that version. Upstream and Debian have released advisories on April 8. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/webkit2gtk/+bug/1970783/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1987706] Re: [FFe] Should preinstall network-manager-openconnect-gnome
** Description changed: The ubuntu-desktop package should recommend network-manager-openconnect- gnome, that is undergoing a main inclusion review (MIR) at bug #1986592. - I believe this deserves a feature freeze exception because it adds support to UBuntu for several types of - enterprise VPNs in wide use. + I believe this deserves a feature freeze exception because it adds + support to Ubuntu for several types of enterprise VPNs in wide use. -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to ubuntu-meta in Ubuntu. https://bugs.launchpad.net/bugs/1987706 Title: [FFe] Should preinstall network-manager-openconnect-gnome Status in ubuntu-meta package in Ubuntu: Incomplete Bug description: The ubuntu-desktop package should recommend network-manager- openconnect-gnome, that is undergoing a main inclusion review (MIR) at bug #1986592. I believe this deserves a feature freeze exception because it adds support to Ubuntu for several types of enterprise VPNs in wide use. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-meta/+bug/1987706/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1987707] Re: [FFe] Should preinstall network-manager-openconnect-gnome
** Description changed: The ubuntu-desktop package should recommend network-manager-openconnect- gnome, that is undergoing a main inclusion review (MIR) at bug #1986592. - I believe this deserves a feature freeze exception because it adds support to UBuntu for several types of - enterprise VPNs in wide use. + I believe this deserves a feature freeze exception because it adds + support to Ubuntu for several types of enterprise VPNs in wide use. -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to ubuntu-meta in Ubuntu. https://bugs.launchpad.net/bugs/1987707 Title: [FFe] Should preinstall network-manager-openconnect-gnome Status in ubuntu-meta package in Ubuntu: New Bug description: The ubuntu-desktop package should recommend network-manager- openconnect-gnome, that is undergoing a main inclusion review (MIR) at bug #1986592. I believe this deserves a feature freeze exception because it adds support to Ubuntu for several types of enterprise VPNs in wide use. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-meta/+bug/1987707/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1987706] [NEW] [FFe] Should preinstall network-manager-openconnect-gnome
Public bug reported: The ubuntu-desktop package should recommend network-manager-openconnect- gnome, that is undergoing a main inclusion review (MIR) at bug #1986592. I believe this deserves a feature freeze exception because it adds support to UBuntu for several types of enterprise VPNs in wide use. ** Affects: ubuntu-meta (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to ubuntu-meta in Ubuntu. https://bugs.launchpad.net/bugs/1987706 Title: [FFe] Should preinstall network-manager-openconnect-gnome Status in ubuntu-meta package in Ubuntu: New Bug description: The ubuntu-desktop package should recommend network-manager- openconnect-gnome, that is undergoing a main inclusion review (MIR) at bug #1986592. I believe this deserves a feature freeze exception because it adds support to UBuntu for several types of enterprise VPNs in wide use. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-meta/+bug/1987706/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1987707] [NEW] [FFe] Should preinstall network-manager-openconnect-gnome
Public bug reported: The ubuntu-desktop package should recommend network-manager-openconnect- gnome, that is undergoing a main inclusion review (MIR) at bug #1986592. I believe this deserves a feature freeze exception because it adds support to Ubuntu for several types of enterprise VPNs in wide use. ** Affects: ubuntu-meta (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to ubuntu-meta in Ubuntu. https://bugs.launchpad.net/bugs/1987707 Title: [FFe] Should preinstall network-manager-openconnect-gnome Status in ubuntu-meta package in Ubuntu: New Bug description: The ubuntu-desktop package should recommend network-manager- openconnect-gnome, that is undergoing a main inclusion review (MIR) at bug #1986592. I believe this deserves a feature freeze exception because it adds support to Ubuntu for several types of enterprise VPNs in wide use. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-meta/+bug/1987707/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1982198] Re: apt update: Can not add an empty (zero-length) key to the cache
This just happened again. -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to appstream in Ubuntu. https://bugs.launchpad.net/bugs/1982198 Title: apt update: Can not add an empty (zero-length) key to the cache Status in appstream package in Ubuntu: Fix Released Status in appstream source package in Focal: New Bug description: When running sudo apt update, I get the following warning after the "Fetched" message: Can not add an empty (zero-length) key to the cache ProblemType: Bug DistroRelease: Ubuntu 20.04 Package: apt 2.0.9 ProcVersionSignature: Ubuntu 5.15.0-41.44~20.04.1-generic 5.15.39 Uname: Linux 5.15.0-41-generic x86_64 ApportVersion: 2.20.11-0ubuntu27.24 Architecture: amd64 CasperMD5CheckResult: skip CurrentDesktop: ubuntu:GNOME Date: Tue Jul 19 16:44:36 2022 InstallationDate: Installed on 2022-04-26 (84 days ago) InstallationMedia: Ubuntu 20.04.4 LTS "Focal Fossa" - Release amd64 (20220223) SourcePackage: apt UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/appstream/+bug/1982198/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1970783] Re: Multiple vulnerabilities in Bionic
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-32792 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-32816 -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to webkit2gtk in Ubuntu. https://bugs.launchpad.net/bugs/1970783 Title: Multiple vulnerabilities in Bionic Status in webkit2gtk package in Ubuntu: In Progress Bug description: The version in Bionic has multiple vulnerabilities. Please backport version 2.36.0 or at least the security fixes in that version. Upstream and Debian have released advisories on April 8. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/webkit2gtk/+bug/1970783/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1982198] Re: apt update: Can not add an empty (zero-length) key to the cache
It is coming from the appstream source package. Steps to reproduce: 1. Create a minimal Ubuntu 20.04 chroot with all packages that install files in /etc/apt/apt.conf.d on my Ubuntu 20.04 VM installed (that is, update-notifier-common, debconf, aptdaemon, apt-config-icons, apt-config-icons-hidpi, packagekit, appstream, apt, unattended-upgrades, ubuntu-advantage-tools, snapd and command-not-found). 2. Get the source code for all packages in the chroot with apt source SOURCE_PACKAGE_NAMES. 3. Run the following command: $ grep -Fr 'Can not add an empty (zero-length) key to the cache' appstream-0.12.10/.pc/01_less-long-token-noise.patch/src/as-cache.c: "Can not add an empty (zero-length) key to the cache"); appstream-0.12.10/src/as-cache.c:"Can not add an empty (zero-length) key to the cache"); ** Changed in: ubuntu Status: Incomplete => New ** Package changed: ubuntu => appstream (Ubuntu) -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to appstream in Ubuntu. https://bugs.launchpad.net/bugs/1982198 Title: apt update: Can not add an empty (zero-length) key to the cache Status in appstream package in Ubuntu: New Bug description: When running sudo apt update, I get the following warning after the "Fetched" message: Can not add an empty (zero-length) key to the cache ProblemType: Bug DistroRelease: Ubuntu 20.04 Package: apt 2.0.9 ProcVersionSignature: Ubuntu 5.15.0-41.44~20.04.1-generic 5.15.39 Uname: Linux 5.15.0-41-generic x86_64 ApportVersion: 2.20.11-0ubuntu27.24 Architecture: amd64 CasperMD5CheckResult: skip CurrentDesktop: ubuntu:GNOME Date: Tue Jul 19 16:44:36 2022 InstallationDate: Installed on 2022-04-26 (84 days ago) InstallationMedia: Ubuntu 20.04.4 LTS "Focal Fossa" - Release amd64 (20220223) SourcePackage: apt UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/appstream/+bug/1982198/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1248174] Re: Update the Ubuntu colour palette to fit the spec
Alberto Salvia Novella, you can create Ubuntu VMs and test in them, just like I do. -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to libreoffice in Ubuntu. https://bugs.launchpad.net/bugs/1248174 Title: Update the Ubuntu colour palette to fit the spec Status in One Hundred Papercuts: Triaged Status in Inkscape: Fix Released Status in Ubuntu Accomplishments Daemon: Confirmed Status in Ubuntu Accomplishments Extra Information: Confirmed Status in Ubuntu Accomplishments System: Confirmed Status in Ubuntu Accomplishments Viewer: Confirmed Status in Ubuntu Accomplishments Web Gallery: Confirmed Status in Ubuntu Brand Guidelines website: Invalid Status in ubuntu-community: Fix Released Status in Ubuntu Community Accomplishments: Confirmed Status in Ubuntu Desktop Accomplishments: Confirmed Status in gimp package in Ubuntu: Incomplete Status in inkscape package in Ubuntu: Fix Released Status in libreoffice package in Ubuntu: Fix Released Bug description: HOW TO REPRODUCE 1. In Inkscape create a figure colored "Accent Orange", from the "Ubuntu" colour palette. 2. Compare colour with "Ubuntu Orange" in http://design.ubuntu.com/brand/colour-palette. ** EXPECTED BEHAVIOUR ** - The colour to be the same. ** REAL BEHAVIOUR ** - The colour is different. - The colours listed in the palette from Inkscape have no relationship with the ones in design.ubuntu.com. *** WORK-AROUND *** - To use the colours in http://design.ubuntu.com/brand/colour-palette instead. RELEVANT DETAILS - Orange colour is very similar, but not equal. So it's very probable someone use the wrong colour in their designs for Ubuntu. - In fact, the logo of "Ubuntu" project in Launchpad is affected (https://launchpad.net/ubuntu). - A demonstrative image is attached to this bug. ** TECHNICAL INFO ** ProblemType: Bug DistroRelease: Ubuntu 13.10 Package: inkscape 0.48.4-1ubuntu3 ProcVersionSignature: Ubuntu 3.8.0-25.37-generic 3.8.13 Uname: Linux 3.8.0-25-generic x86_64 ApportVersion: 2.12.5-0ubuntu2.1 Architecture: amd64 Date: Tue Nov 5 13:47:52 2013 InstallationDate: Installed on 2013-05-21 (167 days ago) InstallationMedia: Ubuntu 13.04 "Raring Ringtail" - Release amd64 (20130424) MarkForUpload: True SourcePackage: inkscape UpgradeStatus: Upgraded to saucy on 2013-10-18 (18 days ago) To manage notifications about this bug go to: https://bugs.launchpad.net/hundredpapercuts/+bug/1248174/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1248174] Re: Update the Ubuntu colour palette to fit the spec
Is there an Ubuntu color palette in any Ubuntu release under standard support (18.04 or later, including Kinetic)? ** Changed in: gimp (Ubuntu) Status: Triaged => Incomplete -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to libreoffice in Ubuntu. https://bugs.launchpad.net/bugs/1248174 Title: Update the Ubuntu colour palette to fit the spec Status in One Hundred Papercuts: Triaged Status in Inkscape: Fix Released Status in Ubuntu Accomplishments Daemon: Confirmed Status in Ubuntu Accomplishments Extra Information: Confirmed Status in Ubuntu Accomplishments System: Confirmed Status in Ubuntu Accomplishments Viewer: Confirmed Status in Ubuntu Accomplishments Web Gallery: Confirmed Status in Ubuntu Brand Guidelines website: Invalid Status in ubuntu-community: Fix Released Status in Ubuntu Community Accomplishments: Confirmed Status in Ubuntu Desktop Accomplishments: Confirmed Status in gimp package in Ubuntu: Incomplete Status in inkscape package in Ubuntu: Fix Released Status in libreoffice package in Ubuntu: Fix Released Bug description: HOW TO REPRODUCE 1. In Inkscape create a figure colored "Accent Orange", from the "Ubuntu" colour palette. 2. Compare colour with "Ubuntu Orange" in http://design.ubuntu.com/brand/colour-palette. ** EXPECTED BEHAVIOUR ** - The colour to be the same. ** REAL BEHAVIOUR ** - The colour is different. - The colours listed in the palette from Inkscape have no relationship with the ones in design.ubuntu.com. *** WORK-AROUND *** - To use the colours in http://design.ubuntu.com/brand/colour-palette instead. RELEVANT DETAILS - Orange colour is very similar, but not equal. So it's very probable someone use the wrong colour in their designs for Ubuntu. - In fact, the logo of "Ubuntu" project in Launchpad is affected (https://launchpad.net/ubuntu). - A demonstrative image is attached to this bug. ** TECHNICAL INFO ** ProblemType: Bug DistroRelease: Ubuntu 13.10 Package: inkscape 0.48.4-1ubuntu3 ProcVersionSignature: Ubuntu 3.8.0-25.37-generic 3.8.13 Uname: Linux 3.8.0-25-generic x86_64 ApportVersion: 2.12.5-0ubuntu2.1 Architecture: amd64 Date: Tue Nov 5 13:47:52 2013 InstallationDate: Installed on 2013-05-21 (167 days ago) InstallationMedia: Ubuntu 13.04 "Raring Ringtail" - Release amd64 (20130424) MarkForUpload: True SourcePackage: inkscape UpgradeStatus: Upgraded to saucy on 2013-10-18 (18 days ago) To manage notifications about this bug go to: https://bugs.launchpad.net/hundredpapercuts/+bug/1248174/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1248174] Re: Update the Ubuntu colour palette to fit the spec
What does this bug have to do with GIMP? ** Changed in: gimp (Ubuntu) Status: Triaged => Incomplete -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to libreoffice in Ubuntu. https://bugs.launchpad.net/bugs/1248174 Title: Update the Ubuntu colour palette to fit the spec Status in One Hundred Papercuts: Triaged Status in Inkscape: Fix Released Status in Ubuntu Accomplishments Daemon: Confirmed Status in Ubuntu Accomplishments Extra Information: Confirmed Status in Ubuntu Accomplishments System: Confirmed Status in Ubuntu Accomplishments Viewer: Confirmed Status in Ubuntu Accomplishments Web Gallery: Confirmed Status in Ubuntu Brand Guidelines website: Invalid Status in ubuntu-community: Fix Released Status in Ubuntu Community Accomplishments: Confirmed Status in Ubuntu Desktop Accomplishments: Confirmed Status in gimp package in Ubuntu: Incomplete Status in inkscape package in Ubuntu: Fix Released Status in libreoffice package in Ubuntu: Fix Released Bug description: HOW TO REPRODUCE 1. In Inkscape create a figure colored "Accent Orange", from the "Ubuntu" colour palette. 2. Compare colour with "Ubuntu Orange" in http://design.ubuntu.com/brand/colour-palette. ** EXPECTED BEHAVIOUR ** - The colour to be the same. ** REAL BEHAVIOUR ** - The colour is different. - The colours listed in the palette from Inkscape have no relationship with the ones in design.ubuntu.com. *** WORK-AROUND *** - To use the colours in http://design.ubuntu.com/brand/colour-palette instead. RELEVANT DETAILS - Orange colour is very similar, but not equal. So it's very probable someone use the wrong colour in their designs for Ubuntu. - In fact, the logo of "Ubuntu" project in Launchpad is affected (https://launchpad.net/ubuntu). - A demonstrative image is attached to this bug. ** TECHNICAL INFO ** ProblemType: Bug DistroRelease: Ubuntu 13.10 Package: inkscape 0.48.4-1ubuntu3 ProcVersionSignature: Ubuntu 3.8.0-25.37-generic 3.8.13 Uname: Linux 3.8.0-25-generic x86_64 ApportVersion: 2.12.5-0ubuntu2.1 Architecture: amd64 Date: Tue Nov 5 13:47:52 2013 InstallationDate: Installed on 2013-05-21 (167 days ago) InstallationMedia: Ubuntu 13.04 "Raring Ringtail" - Release amd64 (20130424) MarkForUpload: True SourcePackage: inkscape UpgradeStatus: Upgraded to saucy on 2013-10-18 (18 days ago) To manage notifications about this bug go to: https://bugs.launchpad.net/hundredpapercuts/+bug/1248174/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1982422] [NEW] Multiple vulnerabilities in Bionic, Focal and Jammy
*** This bug is a security vulnerability *** Public security bug reported: The version in Bionic is vulnerable to all CVEs listed below. The versions in Focal and Jammy are vulnerable to CVE-2022-30067 and CVE-2022-32990. Please publish patched packages. ** Affects: gimp (Ubuntu) Importance: Undecided Status: New ** Information type changed from Private Security to Public Security ** Also affects: gimp (Ubuntu) Importance: Undecided Status: New ** No longer affects: gtk+2.0 (Ubuntu) ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-30067 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-32990 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12713 -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to gtk+2.0 in Ubuntu. https://bugs.launchpad.net/bugs/1982422 Title: Multiple vulnerabilities in Bionic, Focal and Jammy Status in gimp package in Ubuntu: New Bug description: The version in Bionic is vulnerable to all CVEs listed below. The versions in Focal and Jammy are vulnerable to CVE-2022-30067 and CVE-2022-32990. Please publish patched packages. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gimp/+bug/1982422/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 283115] Re: Gimp: toolbox windows can't be minimized
** Changed in: gimp (Ubuntu) Status: Confirmed => Fix Released ** Also affects: gtk+2.0 (Ubuntu) Importance: Undecided Status: New ** Bug watch added: bugzilla.gnome.org/ #586664 https://bugzilla.gnome.org/show_bug.cgi?id=586664 ** Also affects: gtk via https://bugzilla.gnome.org/show_bug.cgi?id=586664 Importance: Unknown Status: Unknown -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to gtk+2.0 in Ubuntu. https://bugs.launchpad.net/bugs/283115 Title: Gimp: toolbox windows can't be minimized Status in The Gimp: Fix Released Status in GTK+: Unknown Status in gimp package in Ubuntu: Fix Released Status in gtk+2.0 package in Ubuntu: New Bug description: gimp 2.6 in intrepid: it is impossible to minimize toolbar windows; they have only a x-Button to close ideally, these windows should be minimized automatically when the (last) Gimp image window is minimized Update While waiting, I designed some sort of workaround : Gnome>System>Preferences>Windows>Double-click titlebar>Roll up To manage notifications about this bug go to: https://bugs.launchpad.net/gimp/+bug/283115/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1981874] [NEW] gdk_wayland_window_handle_configure_popup: assertion 'impl->transient_for' failed
Public bug reported: When running update-manager in the command line, viewing the changelogs for some updates and installing all updates, update-manager outputs the following to standard error. Gdk-Message: 07:32:40.867: Window 0x559accd09420 is a temporary window without parent, application will not be able to position it on screen. (update-manager:30618): Gdk-CRITICAL **: 07:32:40.878: gdk_wayland_window_handle_configure_popup: assertion 'impl->transient_for' failed Gdk-Message: 07:32:41.983: Window 0x559acd626210 is a temporary window without parent, application will not be able to position it on screen. (update-manager:30618): Gdk-CRITICAL **: 07:32:41.992: gdk_wayland_window_handle_configure_popup: assertion 'impl->transient_for' failed ProblemType: Bug DistroRelease: Ubuntu 22.04 Package: libgtk-3-0 3.24.33-1ubuntu2 ProcVersionSignature: Ubuntu 5.15.0-41.44-generic 5.15.39 Uname: Linux 5.15.0-41-generic x86_64 ApportVersion: 2.20.11-0ubuntu82.1 Architecture: amd64 CasperMD5CheckResult: pass CurrentDesktop: ubuntu:GNOME Date: Sat Jul 16 07:37:26 2022 InstallationDate: Installed on 2022-05-04 (72 days ago) InstallationMedia: Ubuntu 22.04 LTS "Jammy Jellyfish" - Release amd64 (20220419) SourcePackage: gtk+3.0 UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: gtk+3.0 (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug jammy wayland-session ** Summary changed: - gdk_wayland_window_handle_configure_popup: assertion 'impl->transient_for' failed Gdk-Message: 07:32:41.983: Window 0x559acd626210 is a temporary window without parent, application will not be able to position it on screen. (update-manager:30618): Gdk-CRITICAL **: 07:32:41.992: gdk_wayland_window_handle_configure_popup: assertion 'impl->transient_for' failed + gdk_wayland_window_handle_configure_popup: assertion 'impl->transient_for' failed -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to gtk+3.0 in Ubuntu. https://bugs.launchpad.net/bugs/1981874 Title: gdk_wayland_window_handle_configure_popup: assertion 'impl->transient_for' failed Status in gtk+3.0 package in Ubuntu: New Bug description: When running update-manager in the command line, viewing the changelogs for some updates and installing all updates, update-manager outputs the following to standard error. Gdk-Message: 07:32:40.867: Window 0x559accd09420 is a temporary window without parent, application will not be able to position it on screen. (update-manager:30618): Gdk-CRITICAL **: 07:32:40.878: gdk_wayland_window_handle_configure_popup: assertion 'impl->transient_for' failed Gdk-Message: 07:32:41.983: Window 0x559acd626210 is a temporary window without parent, application will not be able to position it on screen. (update-manager:30618): Gdk-CRITICAL **: 07:32:41.992: gdk_wayland_window_handle_configure_popup: assertion 'impl->transient_for' failed ProblemType: Bug DistroRelease: Ubuntu 22.04 Package: libgtk-3-0 3.24.33-1ubuntu2 ProcVersionSignature: Ubuntu 5.15.0-41.44-generic 5.15.39 Uname: Linux 5.15.0-41-generic x86_64 ApportVersion: 2.20.11-0ubuntu82.1 Architecture: amd64 CasperMD5CheckResult: pass CurrentDesktop: ubuntu:GNOME Date: Sat Jul 16 07:37:26 2022 InstallationDate: Installed on 2022-05-04 (72 days ago) InstallationMedia: Ubuntu 22.04 LTS "Jammy Jellyfish" - Release amd64 (20220419) SourcePackage: gtk+3.0 UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gtk+3.0/+bug/1981874/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1971001] Re: Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal and Jammy
Impish reached end-of-life yesterday. ** Summary changed: - Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal, Impish and Jammy + Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal and Jammy ** Description changed: - The versions in Trusty, Xenial, Bionic, Focal, Impish and Jammy may be + The versions in Trusty, Xenial, Bionic, Focal and Jammy may be vulnerable to all CVEs below. Debian released an advisory on March 24. -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to tiff in Ubuntu. https://bugs.launchpad.net/bugs/1971001 Title: Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal and Jammy Status in tiff package in Ubuntu: In Progress Bug description: The versions in Trusty, Xenial, Bionic, Focal and Jammy may be vulnerable to all CVEs below. Debian released an advisory on March 24. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/1971001/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1627524] Re: package libwebkit2gtk-4.0-37:armhf 2.12.5-0ubuntu0.16.04.1 failed to install/upgrade: package is in a very bad inconsistent state; you should reinstall it before
** Changed in: webkit2gtk (Ubuntu) Status: Invalid => Incomplete -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to webkit2gtk in Ubuntu. https://bugs.launchpad.net/bugs/1627524 Title: package libwebkit2gtk-4.0-37:armhf 2.12.5-0ubuntu0.16.04.1 failed to install/upgrade: package is in a very bad inconsistent state; you should reinstall it before attempting configuration Status in webkit2gtk package in Ubuntu: Incomplete Bug description: while doing apt-get update ProblemType: Package DistroRelease: Ubuntu 16.04 Package: libwebkit2gtk-4.0-37:armhf 2.12.5-0ubuntu0.16.04.1 Uname: Linux 4.4.19-v7+ armv7l ApportVersion: 2.20.1-0ubuntu2.1 AptOrdering: libwebkit2gtk-4.0-37: Configure NULL: ConfigurePending Architecture: armhf Date: Sun Sep 25 18:12:43 2016 DpkgTerminalLog: dpkg: error processing package libwebkit2gtk-4.0-37:armhf (--configure): package is in a very bad inconsistent state; you should reinstall it before attempting configuration ErrorMessage: package is in a very bad inconsistent state; you should reinstall it before attempting configuration RelatedPackageVersions: dpkg 1.18.4ubuntu1.1 apt 1.2.12~ubuntu16.04.1 SourcePackage: webkit2gtk Title: package libwebkit2gtk-4.0-37:armhf 2.12.5-0ubuntu0.16.04.1 failed to install/upgrade: package is in a very bad inconsistent state; you should reinstall it before attempting configuration UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/webkit2gtk/+bug/1627524/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1970783] Re: Multiple vulnerabilities in Bionic
** Attachment added: "Build log" https://bugs.launchpad.net/ubuntu/+source/webkit2gtk/+bug/1970783/+attachment/5598235/+files/webkit2gtk_2.36.3-0ubuntu0.18.04.1_amd64.build -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to webkit2gtk in Ubuntu. https://bugs.launchpad.net/bugs/1970783 Title: Multiple vulnerabilities in Bionic Status in webkit2gtk package in Ubuntu: In Progress Bug description: The version in Bionic has multiple vulnerabilities. Please backport version 2.36.0 or at least the security fixes in that version. Upstream and Debian have released advisories on April 8. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/webkit2gtk/+bug/1970783/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1970783] Re: Multiple vulnerabilities in Bionic
Upstream bugs for CMake and ICU requirements: * CMake (3.12 then 3.21, Bionic has 3.10): https://bugs.webkit.org/show_bug.cgi?id=221727 * ICU (61.2, Bionic has 60.3): https://bugs.webkit.org/show_bug.cgi?id=229608 When I tried to build the new version (merged from Debian testing and with the requirements on CMake and ICU versions lowered to the versions in Ubuntu 18.04), I got the following error: -- Platform-specific CMakeLists not found: /home/user/webkit2gtk-2.36.3/Source/bmalloc/PlatformGTK.cmake CMake Error at Source/cmake/WebKitMacros.cmake:155 (target_link_libraries): Object library target "bmalloc" may not link to anything. Call Stack (most recent call first): Source/cmake/WebKitMacros.cmake:299 (_WEBKIT_TARGET) Source/bmalloc/CMakeLists.txt:682 (WEBKIT_FRAMEWORK) -- Configuring incomplete, errors occurred! Build in my PPA (for amd64): https://launchpad.net/~luis220413/+archive/ubuntu/security- updates/+build/24093172 ** Bug watch added: bugs.webkit.org/ #221727 https://bugs.webkit.org/show_bug.cgi?id=221727 ** Bug watch added: bugs.webkit.org/ #229608 https://bugs.webkit.org/show_bug.cgi?id=229608 -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to webkit2gtk in Ubuntu. https://bugs.launchpad.net/bugs/1970783 Title: Multiple vulnerabilities in Bionic Status in webkit2gtk package in Ubuntu: In Progress Bug description: The version in Bionic has multiple vulnerabilities. Please backport version 2.36.0 or at least the security fixes in that version. Upstream and Debian have released advisories on April 8. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/webkit2gtk/+bug/1970783/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1970783] Re: Multiple vulnerabilities in Bionic
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-26700 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-26709 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-26717 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-26716 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-26719 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-30293 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-30294 ** Changed in: webkit2gtk (Ubuntu) Status: Confirmed => In Progress ** Changed in: webkit2gtk (Ubuntu) Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara (luis220413) -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to webkit2gtk in Ubuntu. https://bugs.launchpad.net/bugs/1970783 Title: Multiple vulnerabilities in Bionic Status in webkit2gtk package in Ubuntu: In Progress Bug description: The version in Bionic has multiple vulnerabilities. Please backport version 2.36.0 or at least the security fixes in that version. Upstream and Debian have released advisories on April 8. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/webkit2gtk/+bug/1970783/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1970746] Re: New release 101.0.4951.41 for Bionic
Please provide a progress report on testing and validation of this package. Meanwhile, upstream released version 101.0.4951.64 for Linux (version 101.0.4951.67 was only released for Windows). -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to chromium-browser in Ubuntu. https://bugs.launchpad.net/bugs/1970746 Title: New release 101.0.4951.41 for Bionic Status in chromium-browser package in Ubuntu: In Progress Bug description: A new upstream release 101.0.4951.41 is available. Debian released a security advisory on April 27. Please package it for Bionic. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1970746/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1971001] Re: Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal, Impish and Jammy
Packages patched for CVE-2020-35522, CVE-2022-0561, CVE-2022-0562, CVE-2022-0865 and CVE-2022-0891 are available for Bionic, Focal and Impish at https://launchpad.net/~ubuntu-security- proposed/+archive/ubuntu/ppa. (Impish is not affected by CVE-2020-35522.) Please patch the other CVEs and release a patched version for Jammy. ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-35522 -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to tiff in Ubuntu. https://bugs.launchpad.net/bugs/1971001 Title: Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal, Impish and Jammy Status in tiff package in Ubuntu: In Progress Bug description: The versions in Trusty, Xenial, Bionic, Focal and Impish may be vulnerable to all CVEs below. The version in Jammy is vulnerable to CVE-2022-0865. Debian released an advisory on March 24. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/1971001/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1971001] Re: Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal, Impish and Jammy
** Changed in: tiff (Ubuntu) Status: Confirmed => In Progress -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to tiff in Ubuntu. https://bugs.launchpad.net/bugs/1971001 Title: Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal, Impish and Jammy Status in tiff package in Ubuntu: In Progress Bug description: The versions in Trusty, Xenial, Bionic, Focal and Impish may be vulnerable to all CVEs below. The version in Jammy is vulnerable to CVE-2022-0865. Debian released an advisory on March 24. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/1971001/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1970746] Re: New release 101.0.4951.41 for Bionic
I have noticed that the latest version (101.0.4951.54) is available in the following PPA: https://launchpad.net/~canonical-chromium-builds/+archive/ubuntu/stage Please release this version to bionic-updates. -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to chromium-browser in Ubuntu. https://bugs.launchpad.net/bugs/1970746 Title: New release 101.0.4951.41 for Bionic Status in chromium-browser package in Ubuntu: In Progress Bug description: A new upstream release 101.0.4951.41 is available. Debian released a security advisory on April 27. Please package it for Bionic. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1970746/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1971001] Re: Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal, Impish and Jammy
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-22844 ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to tiff in Ubuntu. https://bugs.launchpad.net/bugs/1971001 Title: Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal, Impish and Jammy Status in tiff package in Ubuntu: New Bug description: The versions in Trusty, Xenial, Bionic, Focal and Impish may be vulnerable to all CVEs below. The version in Jammy is vulnerable to CVE-2022-0865. Debian released an advisory on March 24. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/1971001/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1970783] Re: Multiple vulnerabilities in Bionic
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-42762 ** Description changed: - *** Incomplete - Do not fix now *** - The version in Bionic has multiple vulnerabilities. Please backport version 2.36.0 or at least the security fixes in that version. Upstream and Debian have released advisories on April 8. ** Changed in: webkit2gtk (Ubuntu) Status: Incomplete => Opinion ** Changed in: webkit2gtk (Ubuntu) Status: Opinion => New ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to webkit2gtk in Ubuntu. https://bugs.launchpad.net/bugs/1970783 Title: Multiple vulnerabilities in Bionic Status in webkit2gtk package in Ubuntu: New Bug description: The version in Bionic has multiple vulnerabilities. Please backport version 2.36.0 or at least the security fixes in that version. Upstream and Debian have released advisories on April 8. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/webkit2gtk/+bug/1970783/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1970783] Re: Multiple vulnerabilities in Bionic
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-30934 ** Description changed: + *** Incomplete - Do not fix now *** + The version in Bionic has multiple vulnerabilities. Please backport version 2.36.0 or at least the security fixes in that version. Upstream and Debian have released advisories on April 8. ** Information type changed from Public Security to Private Security ** Changed in: webkit2gtk (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to webkit2gtk in Ubuntu. https://bugs.launchpad.net/bugs/1970783 Title: Multiple vulnerabilities in Bionic Status in webkit2gtk package in Ubuntu: Incomplete Bug description: *** Incomplete - Do not fix now *** The version in Bionic has multiple vulnerabilities. Please backport version 2.36.0 or at least the security fixes in that version. Upstream and Debian have released advisories on April 8. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/webkit2gtk/+bug/1970783/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1970783] Re: Multiple vulnerabilities in Bionic
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-22620 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-22589 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-22592 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-22590 -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to webkit2gtk in Ubuntu. https://bugs.launchpad.net/bugs/1970783 Title: Multiple vulnerabilities in Bionic Status in webkit2gtk package in Ubuntu: New Bug description: The version in Bionic has multiple vulnerabilities. Please backport version 2.36.0 or at least the security fixes in that version. Upstream and Debian have released advisories on April 8. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/webkit2gtk/+bug/1970783/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1763521] Re: package libwebkit2gtk-4.0-37 2.20.1-1 failed to install/upgrade: Extrahierte Daten für »./usr/lib/x86_64-linux-gnu/libwebkit2gtk-4.0.so.37.28.1« können nicht nach
Cannot reproduce: in my Ubuntu 18.04 VM, libwebkit2gtk-4.0-37 reinstalls normally. ** Changed in: webkit2gtk (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to webkit2gtk in Ubuntu. https://bugs.launchpad.net/bugs/1763521 Title: package libwebkit2gtk-4.0-37 2.20.1-1 failed to install/upgrade: Extrahierte Daten für »./usr/lib/x86_64-linux- gnu/libwebkit2gtk-4.0.so.37.28.1« können nicht nach »/usr/lib/x86_64-linux-gnu/libwebkit2gtk-4.0.so.37.28.1.dpkg-new« kopiert werden: Unerwartetes Ende der Datei oder des Datenstroms Status in webkit2gtk package in Ubuntu: Invalid Bug description: after having problems with kernel 4.15.x in ubuntu 18.04 i upgraded the kernel and after booting kernel 4.16 as suggestet there comes this prob --> maybe interesting for further updates. Best regards ProblemType: Package DistroRelease: Ubuntu 18.04 Package: libwebkit2gtk-4.0-37 2.20.1-1 Uname: Linux 4.16.2-041602-generic x86_64 ApportVersion: 2.20.9-0ubuntu4 Architecture: amd64 Date: Fri Apr 13 00:07:10 2018 ErrorMessage: Extrahierte Daten für »./usr/lib/x86_64-linux-gnu/libwebkit2gtk-4.0.so.37.28.1« können nicht nach »/usr/lib/x86_64-linux-gnu/libwebkit2gtk-4.0.so.37.28.1.dpkg-new« kopiert werden: Unerwartetes Ende der Datei oder des Datenstroms InstallationDate: Installed on 2018-04-10 (2 days ago) InstallationMedia: Ubuntu 18.04 LTS "Bionic Beaver" - Beta amd64 (20180404) Python3Details: /usr/bin/python3.6, Python 3.6.5, python3-minimal, 3.6.5-2 PythonDetails: /root/Error: command ['which', 'python'] failed with exit code 1:, Error: [Errno 2] Datei oder Verzeichnis nicht gefunden: "/root/Error: command ['which', 'python'] failed with exit code 1:": "/root/Error: command ['which', 'python'] failed with exit code 1:", unpackaged RelatedPackageVersions: dpkg 1.19.0.5ubuntu1 apt 1.6~beta1 SourcePackage: webkit2gtk Title: package libwebkit2gtk-4.0-37 2.20.1-1 failed to install/upgrade: Extrahierte Daten für »./usr/lib/x86_64-linux-gnu/libwebkit2gtk-4.0.so.37.28.1« können nicht nach »/usr/lib/x86_64-linux-gnu/libwebkit2gtk-4.0.so.37.28.1.dpkg-new« kopiert werden: Unerwartetes Ende der Datei oder des Datenstroms UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/webkit2gtk/+bug/1763521/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1970783] [NEW] Multiple vulnerabilities in Bionic
*** This bug is a security vulnerability *** Public security bug reported: The version in Bionic has multiple vulnerabilities. Please backport version 2.36.0 or at least the security fixes in that version. Upstream and Debian have released advisories on April 8. ** Affects: webkit2gtk (Ubuntu) Importance: Undecided Status: New ** Information type changed from Public to Public Security ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-22624 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-22628 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-22629 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-22637 -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to webkit2gtk in Ubuntu. https://bugs.launchpad.net/bugs/1970783 Title: Multiple vulnerabilities in Bionic Status in webkit2gtk package in Ubuntu: New Bug description: The version in Bionic has multiple vulnerabilities. Please backport version 2.36.0 or at least the security fixes in that version. Upstream and Debian have released advisories on April 8. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/webkit2gtk/+bug/1970783/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1627524] Re: package libwebkit2gtk-4.0-37:armhf 2.12.5-0ubuntu0.16.04.1 failed to install/upgrade: package is in a very bad inconsistent state; you should reinstall it before
Xenial is out of standard support and ESM does not cover armhf. ** Changed in: webkit2gtk (Ubuntu) Status: New => Incomplete ** Changed in: webkit2gtk (Ubuntu) Status: Incomplete => Invalid -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to webkit2gtk in Ubuntu. https://bugs.launchpad.net/bugs/1627524 Title: package libwebkit2gtk-4.0-37:armhf 2.12.5-0ubuntu0.16.04.1 failed to install/upgrade: package is in a very bad inconsistent state; you should reinstall it before attempting configuration Status in webkit2gtk package in Ubuntu: Invalid Bug description: while doing apt-get update ProblemType: Package DistroRelease: Ubuntu 16.04 Package: libwebkit2gtk-4.0-37:armhf 2.12.5-0ubuntu0.16.04.1 Uname: Linux 4.4.19-v7+ armv7l ApportVersion: 2.20.1-0ubuntu2.1 AptOrdering: libwebkit2gtk-4.0-37: Configure NULL: ConfigurePending Architecture: armhf Date: Sun Sep 25 18:12:43 2016 DpkgTerminalLog: dpkg: error processing package libwebkit2gtk-4.0-37:armhf (--configure): package is in a very bad inconsistent state; you should reinstall it before attempting configuration ErrorMessage: package is in a very bad inconsistent state; you should reinstall it before attempting configuration RelatedPackageVersions: dpkg 1.18.4ubuntu1.1 apt 1.2.12~ubuntu16.04.1 SourcePackage: webkit2gtk Title: package libwebkit2gtk-4.0-37:armhf 2.12.5-0ubuntu0.16.04.1 failed to install/upgrade: package is in a very bad inconsistent state; you should reinstall it before attempting configuration UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/webkit2gtk/+bug/1627524/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1970746] [NEW] New release 101.0.4951.41 for Bionic
*** This bug is a security vulnerability *** Public security bug reported: A new upstream release 101.0.4951.41 is available. Debian released a security advisory on April 27. Please package it for Bionic. ** Affects: chromium-browser (Ubuntu) Importance: Undecided Status: New ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1477 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1478 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1479 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1480 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1481 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1482 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1483 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1484 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1485 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1486 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1487 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1488 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1489 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1490 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1491 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1492 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1493 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1494 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1495 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1496 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1497 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1498 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1499 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1500 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1501 ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to chromium-browser in Ubuntu. https://bugs.launchpad.net/bugs/1970746 Title: New release 101.0.4951.41 for Bionic Status in chromium-browser package in Ubuntu: New Bug description: A new upstream release 101.0.4951.41 is available. Debian released a security advisory on April 27. Please package it for Bionic. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1970746/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1970137] Re: New release 101.0.4951.41 for Bionic
** Changed in: chromium-browser (Ubuntu) Status: New => Incomplete ** Changed in: chromium-browser (Ubuntu) Status: Incomplete => Fix Released -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to chromium-browser in Ubuntu. https://bugs.launchpad.net/bugs/1970137 Title: New release 100.0.4896.127 for Bionic Status in chromium-browser package in Ubuntu: Fix Released Bug description: A new upstream release 100.0.4896.127 is available. Debian first released Chromium 100 on April 3 and this version was released by Debian on April 13. Please package it for Bionic. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1970137/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1970502] Re: New release 91.8
** Description changed: Thunderbird 91.8 has been released. Please package this version to all Ubuntu releases under standard support. - Debian has released this version on April 10. + Debian has released a security advisory on April 10. ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to thunderbird in Ubuntu. https://bugs.launchpad.net/bugs/1970502 Title: New release 91.8 Status in thunderbird package in Ubuntu: New Bug description: Thunderbird 91.8 has been released. Please package this version to all Ubuntu releases under standard support. Debian has released a security advisory on April 10. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/thunderbird/+bug/1970502/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1970137] Re: New release 100.0.4896.127 for Bionic
** Description changed: A new upstream release 100.0.4896.127 is available. + Debian first released Chromium 100 on April 3 and this version was + released by Debian on April 13. + Please package it for Bionic. -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to chromium-browser in Ubuntu. https://bugs.launchpad.net/bugs/1970137 Title: New release 100.0.4896.127 for Bionic Status in chromium-browser package in Ubuntu: New Bug description: A new upstream release 100.0.4896.127 is available. Debian first released Chromium 100 on April 3 and this version was released by Debian on April 13. Please package it for Bionic. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1970137/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp
[Desktop-packages] [Bug 1970137] [NEW] New release 100.0.4896.127 for Bionic
*** This bug is a security vulnerability *** Public security bug reported: A new upstream release 100.0.4896.127 is available. Please package it for Bionic. ** Affects: chromium-browser (Ubuntu) Importance: Undecided Status: New ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1364 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1305 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1306 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1307 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1308 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1309 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1310 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1311 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1312 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1313 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1314 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1232 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1125 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1127 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1128 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1129 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1130 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1131 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1132 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1133 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1134 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1135 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1136 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1137 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1138 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1139 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1141 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1142 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1143 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1144 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1145 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1146 ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to chromium-browser in Ubuntu. https://bugs.launchpad.net/bugs/1970137 Title: New release 100.0.4896.127 for Bionic Status in chromium-browser package in Ubuntu: New Bug description: A new upstream release 100.0.4896.127 is available. Please package it for Bionic. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1970137/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp