[Touch-packages] [Bug 1950828] Re: ibus-daemon crashed with SIGABRT in g_mutex_clear().

2024-02-05 Thread Luís Infante da Câmara
This is not fixed. See bug #2052422.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ibus in Ubuntu.
https://bugs.launchpad.net/bugs/1950828

Title:
  ibus-daemon crashed with SIGABRT in g_mutex_clear().

Status in ibus package in Ubuntu:
  Fix Released

Bug description:
  Bug report generated after logging in.  Nothing other then the log in
  was done.

  ProblemType: Crash
  DistroRelease: Ubuntu 22.04
  Package: ibus 1.5.25-2build1
  ProcVersionSignature: Ubuntu 5.13.0-19.19-generic 5.13.14
  Uname: Linux 5.13.0-19-generic x86_64
  ApportVersion: 2.20.11-0ubuntu73
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Fri Nov 12 15:58:02 2021
  ExecutablePath: /usr/bin/ibus-daemon
  InstallationDate: Installed on 2021-10-27 (16 days ago)
  InstallationMedia: Ubuntu 22.04 LTS "Jammy Jellyfish" - Alpha amd64 (20211025)
  ProcCmdline: ibus-daemon --panel disable
  ProcEnviron:
   LANG=en_US.UTF-8
   PATH=(custom, no user)
   SHELL=/bin/bash
   XDG_RUNTIME_DIR=
  Signal: 6
  SourcePackage: ibus
  StacktraceTop:
   g_mutex_clear () from /lib/x86_64-linux-gnu/libglib-2.0.so.0
   ?? ()
   g_closure_invoke () from /lib/x86_64-linux-gnu/libgobject-2.0.so.0
   ?? () from /lib/x86_64-linux-gnu/libgobject-2.0.so.0
   g_signal_emit_valist () from /lib/x86_64-linux-gnu/libgobject-2.0.so.0
  Title: ibus-daemon crashed with SIGABRT in g_mutex_clear()
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin lxd plugdev sambashare sudo
  separator:

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ibus/+bug/1950828/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1950828] Re: ibus-daemon crashed with SIGABRT in g_mutex_clear().

2024-02-05 Thread Luís Infante da Câmara
** Changed in: ibus (Ubuntu)
 Assignee: Marcos Casquero (mcasquero) => (unassigned)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ibus in Ubuntu.
https://bugs.launchpad.net/bugs/1950828

Title:
  ibus-daemon crashed with SIGABRT in g_mutex_clear().

Status in ibus package in Ubuntu:
  Fix Released

Bug description:
  Bug report generated after logging in.  Nothing other then the log in
  was done.

  ProblemType: Crash
  DistroRelease: Ubuntu 22.04
  Package: ibus 1.5.25-2build1
  ProcVersionSignature: Ubuntu 5.13.0-19.19-generic 5.13.14
  Uname: Linux 5.13.0-19-generic x86_64
  ApportVersion: 2.20.11-0ubuntu73
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Fri Nov 12 15:58:02 2021
  ExecutablePath: /usr/bin/ibus-daemon
  InstallationDate: Installed on 2021-10-27 (16 days ago)
  InstallationMedia: Ubuntu 22.04 LTS "Jammy Jellyfish" - Alpha amd64 (20211025)
  ProcCmdline: ibus-daemon --panel disable
  ProcEnviron:
   LANG=en_US.UTF-8
   PATH=(custom, no user)
   SHELL=/bin/bash
   XDG_RUNTIME_DIR=
  Signal: 6
  SourcePackage: ibus
  StacktraceTop:
   g_mutex_clear () from /lib/x86_64-linux-gnu/libglib-2.0.so.0
   ?? ()
   g_closure_invoke () from /lib/x86_64-linux-gnu/libgobject-2.0.so.0
   ?? () from /lib/x86_64-linux-gnu/libgobject-2.0.so.0
   g_signal_emit_valist () from /lib/x86_64-linux-gnu/libgobject-2.0.so.0
  Title: ibus-daemon crashed with SIGABRT in g_mutex_clear()
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin lxd plugdev sambashare sudo
  separator:

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ibus/+bug/1950828/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1944430] Re: ibus-extension-gtk3 crashed with SIGABRT in g_assertion_message()

2024-01-14 Thread Luís Infante da Câmara
** Changed in: ibus (Ubuntu)
   Status: Expired => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ibus in Ubuntu.
https://bugs.launchpad.net/bugs/1944430

Title:
  ibus-extension-gtk3 crashed with SIGABRT in g_assertion_message()

Status in ibus package in Ubuntu:
  Confirmed

Bug description:
  Crash information appeared at Ubuntu Unity desktop startup

  ProblemType: Crash
  DistroRelease: Ubuntu 21.10
  Package: ibus 1.5.25-2
  ProcVersionSignature: Ubuntu 5.13.0-16.16-generic 5.13.13
  Uname: Linux 5.13.0-16-generic x86_64
  ApportVersion: 2.20.11-0ubuntu69
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Tue Sep 21 14:39:19 2021
  ExecutablePath: /usr/libexec/ibus-extension-gtk3
  InstallationDate: Installed on 2021-04-27 (146 days ago)
  InstallationMedia: Ubuntu 21.04 "Hirsute Hippo" - Beta amd64 (20210331.1)
  ProcCmdline: /usr/libexec/ibus-extension-gtk3
  ProcEnviron:
   LANG=de_DE.UTF-8
   PATH=(custom, no user)
   SHELL=/bin/bash
   XDG_RUNTIME_DIR=
  Signal: 6
  SourcePackage: ibus
  StacktraceTop:
   ?? () from /lib/x86_64-linux-gnu/libglib-2.0.so.0
   g_assertion_message_expr () from /lib/x86_64-linux-gnu/libglib-2.0.so.0
   ?? ()
   ?? () from /lib/x86_64-linux-gnu/libgio-2.0.so.0
   g_main_context_dispatch () from /lib/x86_64-linux-gnu/libglib-2.0.so.0
  Title: ibus-extension-gtk3 crashed with SIGABRT in g_assertion_message_expr()
  UpgradeStatus: Upgraded to impish on 2021-09-21 (0 days ago)
  UserGroups: adm cdrom dip lpadmin lxd plugdev sambashare sudo
  separator:

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ibus/+bug/1944430/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2035585] Re: Versions in Ubuntu 20.04, 22.04 and 23.04 are vulnerable to CVE-2023-37329

2023-09-14 Thread Luís Infante da Câmara
** Patch added: "gst-plugins-bad1.0_focal.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/gst-plugins-bad1.0/+bug/2035585/+attachment/5700925/+files/gst-plugins-bad1.0_focal.debdiff

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-37329

** Tags added: community-security focal jammy lunar patch

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gst-plugins-bad1.0 in
Ubuntu.
https://bugs.launchpad.net/bugs/2035585

Title:
  Versions in Ubuntu 20.04, 22.04 and 23.04 are vulnerable to
  CVE-2023-37329

Status in gst-plugins-bad1.0 package in Ubuntu:
  Confirmed

Bug description:
  The versions in Ubuntu 20.04, 22.04 and 23.04 are vulnerable to
  CVE-2023-37329.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gst-plugins-bad1.0/+bug/2035585/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2035585] Re: Versions in Ubuntu 20.04, 22.04 and 23.04 are vulnerable to CVE-2023-37329

2023-09-14 Thread Luís Infante da Câmara
** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gst-plugins-bad1.0 in
Ubuntu.
https://bugs.launchpad.net/bugs/2035585

Title:
  Versions in Ubuntu 20.04, 22.04 and 23.04 are vulnerable to
  CVE-2023-37329

Status in gst-plugins-bad1.0 package in Ubuntu:
  New

Bug description:
  The versions in Ubuntu 20.04, 22.04 and 23.04 are vulnerable to
  CVE-2023-37329.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gst-plugins-bad1.0/+bug/2035585/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1987336] Re: Multiple vulnerabilities in Focal

2023-09-01 Thread Luís Infante da Câmara
** Description changed:

  The version in Ubuntu 20.04 is vulnerable to CVE-2020-13962,
- CVE-2020-17507 and CVE-2022-25255.
+ CVE-2020-17507, CVE-2022-25255, CVE-2023-24607, CVE-2023-32762,
+ CVE-2023-32763, CVE-2023-33285, CVE-2023-37369 and CVE-2023-38197.
  
- I will provide a debdiff in this week.
+ The versions in Ubuntu 22.04 are vulnerable to CVE-2023-24607,
+ CVE-2023-32762   , CVE-2023-32763, CVE-2023-33285, CVE-2023-37369 and
+ CVE-2023-38197.
+ 
+ I will provide debdiffs until 3 September.

** Also affects: qt6-base (Ubuntu)
   Importance: Undecided
   Status: New

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-24607

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-32762

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-32763

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-33285

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-37369

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-38197

** Summary changed:

- Multiple vulnerabilities in Focal
+ Multiple vulnerabilities in Focal and Jammy

** Changed in: qt6-base (Ubuntu)
   Status: New => Confirmed

** Changed in: qt6-base (Ubuntu)
 Assignee: (unassigned) => Luís Infante da Câmara (luis220413)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to qtbase-opensource-src in
Ubuntu.
https://bugs.launchpad.net/bugs/1987336

Title:
  Multiple vulnerabilities in Focal and Jammy

Status in qt6-base package in Ubuntu:
  Confirmed
Status in qtbase-opensource-src package in Ubuntu:
  Confirmed

Bug description:
  The version in Ubuntu 20.04 is vulnerable to CVE-2020-13962,
  CVE-2020-17507, CVE-2022-25255, CVE-2023-24607, CVE-2023-32762,
  CVE-2023-32763, CVE-2023-33285, CVE-2023-37369 and CVE-2023-38197.

  The versions in Ubuntu 22.04 are vulnerable to CVE-2023-24607,
  CVE-2023-32762   , CVE-2023-32763, CVE-2023-33285, CVE-2023-37369 and
  CVE-2023-38197.

  I will provide debdiffs until 3 September.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qt6-base/+bug/1987336/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1987336] Re: Multiple vulnerabilities in Focal

2023-09-01 Thread Luís Infante da Câmara
** Changed in: qtbase-opensource-src (Ubuntu)
 Assignee: (unassigned) => Luís Infante da Câmara (luis220413)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to qtbase-opensource-src in
Ubuntu.
https://bugs.launchpad.net/bugs/1987336

Title:
  Multiple vulnerabilities in Focal

Status in qtbase-opensource-src package in Ubuntu:
  Confirmed

Bug description:
  The version in Ubuntu 20.04 is vulnerable to CVE-2020-13962,
  CVE-2020-17507 and CVE-2022-25255.

  I will provide a debdiff in this week.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qtbase-opensource-src/+bug/1987336/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1987336] Re: Multiple vulnerabilities in Focal

2022-12-23 Thread Luís Infante da Câmara
** Changed in: qtbase-opensource-src (Ubuntu)
 Assignee: Luís Infante da Câmara (luis220413) => (unassigned)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to qtbase-opensource-src in
Ubuntu.
https://bugs.launchpad.net/bugs/1987336

Title:
  Multiple vulnerabilities in Focal

Status in qtbase-opensource-src package in Ubuntu:
  Confirmed

Bug description:
  The version in Ubuntu 20.04 is vulnerable to CVE-2020-13962,
  CVE-2020-17507 and CVE-2022-25255.

  I will provide a debdiff in this week.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qtbase-opensource-src/+bug/1987336/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1970961] Re: Version in Bionic has multiple vulnerabilities

2022-12-23 Thread Luís Infante da Câmara
** Changed in: faad2 (Ubuntu)
 Assignee: Luís Infante da Câmara (luis220413) => (unassigned)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to faad2 in Ubuntu.
https://bugs.launchpad.net/bugs/1970961

Title:
  Version in Bionic has multiple vulnerabilities

Status in faad2 package in Ubuntu:
  In Progress

Bug description:
  The version in Bionic is vulnerable to all CVEs listed below.

  The version in Focal is vulnerable to CVE-2021-32272, CVE-2021-32273,
  CVE-2021-32274, CVE-2021-32276, CVE-2021-32277 and CVE-2021-32278.

  Debian released an advisory on March 27.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/faad2/+bug/1970961/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp