[Touch-packages] [Bug 1950828] Re: ibus-daemon crashed with SIGABRT in g_mutex_clear().
This is not fixed. See bug #2052422. -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to ibus in Ubuntu. https://bugs.launchpad.net/bugs/1950828 Title: ibus-daemon crashed with SIGABRT in g_mutex_clear(). Status in ibus package in Ubuntu: Fix Released Bug description: Bug report generated after logging in. Nothing other then the log in was done. ProblemType: Crash DistroRelease: Ubuntu 22.04 Package: ibus 1.5.25-2build1 ProcVersionSignature: Ubuntu 5.13.0-19.19-generic 5.13.14 Uname: Linux 5.13.0-19-generic x86_64 ApportVersion: 2.20.11-0ubuntu73 Architecture: amd64 CasperMD5CheckResult: pass CurrentDesktop: ubuntu:GNOME Date: Fri Nov 12 15:58:02 2021 ExecutablePath: /usr/bin/ibus-daemon InstallationDate: Installed on 2021-10-27 (16 days ago) InstallationMedia: Ubuntu 22.04 LTS "Jammy Jellyfish" - Alpha amd64 (20211025) ProcCmdline: ibus-daemon --panel disable ProcEnviron: LANG=en_US.UTF-8 PATH=(custom, no user) SHELL=/bin/bash XDG_RUNTIME_DIR= Signal: 6 SourcePackage: ibus StacktraceTop: g_mutex_clear () from /lib/x86_64-linux-gnu/libglib-2.0.so.0 ?? () g_closure_invoke () from /lib/x86_64-linux-gnu/libgobject-2.0.so.0 ?? () from /lib/x86_64-linux-gnu/libgobject-2.0.so.0 g_signal_emit_valist () from /lib/x86_64-linux-gnu/libgobject-2.0.so.0 Title: ibus-daemon crashed with SIGABRT in g_mutex_clear() UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin lxd plugdev sambashare sudo separator: To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ibus/+bug/1950828/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1950828] Re: ibus-daemon crashed with SIGABRT in g_mutex_clear().
** Changed in: ibus (Ubuntu) Assignee: Marcos Casquero (mcasquero) => (unassigned) -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to ibus in Ubuntu. https://bugs.launchpad.net/bugs/1950828 Title: ibus-daemon crashed with SIGABRT in g_mutex_clear(). Status in ibus package in Ubuntu: Fix Released Bug description: Bug report generated after logging in. Nothing other then the log in was done. ProblemType: Crash DistroRelease: Ubuntu 22.04 Package: ibus 1.5.25-2build1 ProcVersionSignature: Ubuntu 5.13.0-19.19-generic 5.13.14 Uname: Linux 5.13.0-19-generic x86_64 ApportVersion: 2.20.11-0ubuntu73 Architecture: amd64 CasperMD5CheckResult: pass CurrentDesktop: ubuntu:GNOME Date: Fri Nov 12 15:58:02 2021 ExecutablePath: /usr/bin/ibus-daemon InstallationDate: Installed on 2021-10-27 (16 days ago) InstallationMedia: Ubuntu 22.04 LTS "Jammy Jellyfish" - Alpha amd64 (20211025) ProcCmdline: ibus-daemon --panel disable ProcEnviron: LANG=en_US.UTF-8 PATH=(custom, no user) SHELL=/bin/bash XDG_RUNTIME_DIR= Signal: 6 SourcePackage: ibus StacktraceTop: g_mutex_clear () from /lib/x86_64-linux-gnu/libglib-2.0.so.0 ?? () g_closure_invoke () from /lib/x86_64-linux-gnu/libgobject-2.0.so.0 ?? () from /lib/x86_64-linux-gnu/libgobject-2.0.so.0 g_signal_emit_valist () from /lib/x86_64-linux-gnu/libgobject-2.0.so.0 Title: ibus-daemon crashed with SIGABRT in g_mutex_clear() UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin lxd plugdev sambashare sudo separator: To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ibus/+bug/1950828/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1944430] Re: ibus-extension-gtk3 crashed with SIGABRT in g_assertion_message()
** Changed in: ibus (Ubuntu) Status: Expired => Confirmed -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to ibus in Ubuntu. https://bugs.launchpad.net/bugs/1944430 Title: ibus-extension-gtk3 crashed with SIGABRT in g_assertion_message() Status in ibus package in Ubuntu: Confirmed Bug description: Crash information appeared at Ubuntu Unity desktop startup ProblemType: Crash DistroRelease: Ubuntu 21.10 Package: ibus 1.5.25-2 ProcVersionSignature: Ubuntu 5.13.0-16.16-generic 5.13.13 Uname: Linux 5.13.0-16-generic x86_64 ApportVersion: 2.20.11-0ubuntu69 Architecture: amd64 CasperMD5CheckResult: pass CurrentDesktop: ubuntu:GNOME Date: Tue Sep 21 14:39:19 2021 ExecutablePath: /usr/libexec/ibus-extension-gtk3 InstallationDate: Installed on 2021-04-27 (146 days ago) InstallationMedia: Ubuntu 21.04 "Hirsute Hippo" - Beta amd64 (20210331.1) ProcCmdline: /usr/libexec/ibus-extension-gtk3 ProcEnviron: LANG=de_DE.UTF-8 PATH=(custom, no user) SHELL=/bin/bash XDG_RUNTIME_DIR= Signal: 6 SourcePackage: ibus StacktraceTop: ?? () from /lib/x86_64-linux-gnu/libglib-2.0.so.0 g_assertion_message_expr () from /lib/x86_64-linux-gnu/libglib-2.0.so.0 ?? () ?? () from /lib/x86_64-linux-gnu/libgio-2.0.so.0 g_main_context_dispatch () from /lib/x86_64-linux-gnu/libglib-2.0.so.0 Title: ibus-extension-gtk3 crashed with SIGABRT in g_assertion_message_expr() UpgradeStatus: Upgraded to impish on 2021-09-21 (0 days ago) UserGroups: adm cdrom dip lpadmin lxd plugdev sambashare sudo separator: To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ibus/+bug/1944430/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 2035585] Re: Versions in Ubuntu 20.04, 22.04 and 23.04 are vulnerable to CVE-2023-37329
** Patch added: "gst-plugins-bad1.0_focal.debdiff" https://bugs.launchpad.net/ubuntu/+source/gst-plugins-bad1.0/+bug/2035585/+attachment/5700925/+files/gst-plugins-bad1.0_focal.debdiff ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-37329 ** Tags added: community-security focal jammy lunar patch -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to gst-plugins-bad1.0 in Ubuntu. https://bugs.launchpad.net/bugs/2035585 Title: Versions in Ubuntu 20.04, 22.04 and 23.04 are vulnerable to CVE-2023-37329 Status in gst-plugins-bad1.0 package in Ubuntu: Confirmed Bug description: The versions in Ubuntu 20.04, 22.04 and 23.04 are vulnerable to CVE-2023-37329. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gst-plugins-bad1.0/+bug/2035585/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 2035585] Re: Versions in Ubuntu 20.04, 22.04 and 23.04 are vulnerable to CVE-2023-37329
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to gst-plugins-bad1.0 in Ubuntu. https://bugs.launchpad.net/bugs/2035585 Title: Versions in Ubuntu 20.04, 22.04 and 23.04 are vulnerable to CVE-2023-37329 Status in gst-plugins-bad1.0 package in Ubuntu: New Bug description: The versions in Ubuntu 20.04, 22.04 and 23.04 are vulnerable to CVE-2023-37329. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gst-plugins-bad1.0/+bug/2035585/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1987336] Re: Multiple vulnerabilities in Focal
** Description changed: The version in Ubuntu 20.04 is vulnerable to CVE-2020-13962, - CVE-2020-17507 and CVE-2022-25255. + CVE-2020-17507, CVE-2022-25255, CVE-2023-24607, CVE-2023-32762, + CVE-2023-32763, CVE-2023-33285, CVE-2023-37369 and CVE-2023-38197. - I will provide a debdiff in this week. + The versions in Ubuntu 22.04 are vulnerable to CVE-2023-24607, + CVE-2023-32762 , CVE-2023-32763, CVE-2023-33285, CVE-2023-37369 and + CVE-2023-38197. + + I will provide debdiffs until 3 September. ** Also affects: qt6-base (Ubuntu) Importance: Undecided Status: New ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-24607 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-32762 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-32763 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-33285 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-37369 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-38197 ** Summary changed: - Multiple vulnerabilities in Focal + Multiple vulnerabilities in Focal and Jammy ** Changed in: qt6-base (Ubuntu) Status: New => Confirmed ** Changed in: qt6-base (Ubuntu) Assignee: (unassigned) => Luís Infante da Câmara (luis220413) -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to qtbase-opensource-src in Ubuntu. https://bugs.launchpad.net/bugs/1987336 Title: Multiple vulnerabilities in Focal and Jammy Status in qt6-base package in Ubuntu: Confirmed Status in qtbase-opensource-src package in Ubuntu: Confirmed Bug description: The version in Ubuntu 20.04 is vulnerable to CVE-2020-13962, CVE-2020-17507, CVE-2022-25255, CVE-2023-24607, CVE-2023-32762, CVE-2023-32763, CVE-2023-33285, CVE-2023-37369 and CVE-2023-38197. The versions in Ubuntu 22.04 are vulnerable to CVE-2023-24607, CVE-2023-32762 , CVE-2023-32763, CVE-2023-33285, CVE-2023-37369 and CVE-2023-38197. I will provide debdiffs until 3 September. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qt6-base/+bug/1987336/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1987336] Re: Multiple vulnerabilities in Focal
** Changed in: qtbase-opensource-src (Ubuntu) Assignee: (unassigned) => Luís Infante da Câmara (luis220413) -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to qtbase-opensource-src in Ubuntu. https://bugs.launchpad.net/bugs/1987336 Title: Multiple vulnerabilities in Focal Status in qtbase-opensource-src package in Ubuntu: Confirmed Bug description: The version in Ubuntu 20.04 is vulnerable to CVE-2020-13962, CVE-2020-17507 and CVE-2022-25255. I will provide a debdiff in this week. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qtbase-opensource-src/+bug/1987336/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1987336] Re: Multiple vulnerabilities in Focal
** Changed in: qtbase-opensource-src (Ubuntu) Assignee: Luís Infante da Câmara (luis220413) => (unassigned) -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to qtbase-opensource-src in Ubuntu. https://bugs.launchpad.net/bugs/1987336 Title: Multiple vulnerabilities in Focal Status in qtbase-opensource-src package in Ubuntu: Confirmed Bug description: The version in Ubuntu 20.04 is vulnerable to CVE-2020-13962, CVE-2020-17507 and CVE-2022-25255. I will provide a debdiff in this week. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qtbase-opensource-src/+bug/1987336/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1970961] Re: Version in Bionic has multiple vulnerabilities
** Changed in: faad2 (Ubuntu) Assignee: Luís Infante da Câmara (luis220413) => (unassigned) -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to faad2 in Ubuntu. https://bugs.launchpad.net/bugs/1970961 Title: Version in Bionic has multiple vulnerabilities Status in faad2 package in Ubuntu: In Progress Bug description: The version in Bionic is vulnerable to all CVEs listed below. The version in Focal is vulnerable to CVE-2021-32272, CVE-2021-32273, CVE-2021-32274, CVE-2021-32276, CVE-2021-32277 and CVE-2021-32278. Debian released an advisory on March 27. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/faad2/+bug/1970961/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp