[Bug 2086772] [NEW] package cups-daemon 2.4.7-1.2ubuntu7.2 failed to install/upgrade: unable to make backup link of './usr/lib/cups/backend/ipp' before installing new version: Input/output error

2024-11-06 Thread Lucas Henrique Lins da Silva
Public bug reported: i don't know much about the details, only thing i can say is that i recently started using ubuntu by dual booting with windows, i'm still a beginner at that, the installation process was also not fully complete due to some issues with something called Yaru, but i don't know if

[Bug 2076943] Re: Incorrect GPG signature file during autoinstall when using custom GPG key

2024-10-03 Thread Tiago Pasqualini da Silva
** Merge proposal linked: https://code.launchpad.net/~tiago.pasqualini/curtin/+git/curtin/+merge/474394 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2076943 Title: Incorrect GPG signature file d

[Bug 2076943] Re: Incorrect GPG signature file during autoinstall when using custom GPG key

2024-09-23 Thread Tiago Pasqualini da Silva
** Merge proposal linked: https://code.launchpad.net/~tiago.pasqualini/curtin/+git/curtin/+merge/473681 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2076943 Title: Incorrect GPG signature file d

[Bug 2033963] Re: New upstream bugfix release 3.0.18

2024-09-21 Thread Luís Infante da Câmara
** Changed in: vlc (Ubuntu) Assignee: Luís Infante da Câmara (luis220413) => (unassigned) ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. ht

[Bug 1983568] Re: FTBFS on armhf in Kinetic

2024-09-21 Thread Luís Infante da Câmara
This is now fixed, but it now fails to build in Oracular on all architectures due to two new issues. ** Changed in: xen (Ubuntu) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.lau

[Bug 1094888] Re: GIMP: Could not mount Canon Digital Camera

2024-09-21 Thread Luís Infante da Câmara
** Package changed: gimp (Ubuntu) => libgphoto2 (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1094888 Title: GIMP: Could not mount Canon Digital Camera To manage notifications about this b

[Bug 1971001] Re: Multiple vulnerabilities in Xenial, Bionic, Focal and Jammy

2024-09-21 Thread Luís Infante da Câmara
All of these CVEs are now fixed in all of these releases, including Trusty, that is now end-of-life. ** Summary changed: - Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal and Jammy + Multiple vulnerabilities in Xenial, Bionic, Focal and Jammy ** Description changed: - The versions in

[Bug 1971107] Re: Versions in Focal and Jammy are vulnerable to CVE-2022-26661 and CVE-2022-26662

2024-09-21 Thread Luís Infante da Câmara
** Changed in: tryton-proteus (Ubuntu) Status: In Progress => Confirmed ** Changed in: tryton-server (Ubuntu) Status: In Progress => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bu

[Bug 1971056] Re: CVE-2021-3850

2024-09-21 Thread Luís Infante da Câmara
** Changed in: libphp-adodb (Ubuntu) Status: In Progress => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1971056 Title: CVE-2021-3850 To manage notifications about this bug go to:

[Bug 1982554] Re: Fails to build due to compilation without -fPIC or PIC linking only on amd64

2024-09-21 Thread Luís Infante da Câmara
** Changed in: haskell-call-stack (Ubuntu) Status: Fix Committed => Fix Released ** Changed in: haskell-diff (Ubuntu) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.lau

[Bug 1970961] Re: Version in Bionic has multiple vulnerabilities

2024-09-21 Thread Luís Infante da Câmara
All priority-Medium CVEs in Bionic are now fixed. (There are no CVEs in this package in Bionic with High or Critical priority.) ** Changed in: faad2 (Ubuntu) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribe

[Bug 2033985] Re: Multiple vulnerabilities in Ubuntu 20.04 and 22.04

2024-09-21 Thread Luís Infante da Câmara
This is now fixed in Ubuntu 20.04 in the security pocket, in Ubuntu 22.04 through Ubuntu Pro, and in the development release. ** Changed in: jqueryui (Ubuntu) Status: Confirmed => Fix Released ** Information type changed from Private Security to Public Security -- You received this bug n

[Bug 1983018] Re: Backport to Ubuntu 18.04 (and in some cases 20.04)

2024-09-21 Thread Luís Infante da Câmara
Ubuntu 18.04 is now in ESM. ** Changed in: node-deepmerge (Ubuntu) Status: In Progress => Invalid ** Changed in: node-rollup (Ubuntu) Status: In Progress => Invalid ** Summary changed: - Backport to Ubuntu 18.04 (and in some cases 20.04) + Backport to Ubuntu 20.04 ** No longer af

[Bug 1970961] Re: Version in Bionic has multiple vulnerabilities

2024-09-21 Thread Luís Infante da Câmara
** Changed in: faad2 (Ubuntu) Status: In Progress => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970961 Title: Version in Bionic has multiple vulnerabilities To manage notificat

[Bug 1971004] Re: CVE-2022-23614

2024-09-21 Thread Luís Infante da Câmara
** Changed in: php-twig (Ubuntu) Status: In Progress => Confirmed ** Changed in: twig (Ubuntu) Status: In Progress => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1971004 Tit

[Bug 1987336] Re: Multiple vulnerabilities in Focal and Jammy

2024-09-21 Thread Luís Infante da Câmara
** Changed in: qt6-base (Ubuntu) Assignee: Luís Infante da Câmara (luis220413) => (unassigned) ** Changed in: qtbase-opensource-src (Ubuntu) Assignee: Luís Infante da Câmara (luis220413) => (unassigned) -- You received this bug notification because you are a member of Ubunt

[Bug 1970637] Re: ffmpeg depends on libmfx-gen1.2 on Alder Lake for Intel QSV support

2024-09-21 Thread Luís Infante da Câmara
** Changed in: intel-mediasdk (Ubuntu) Assignee: Luís Infante da Câmara (luis220413) => (unassigned) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970637 Title: ffmpeg depends on lib

[Bug 2081584] Re: Network Manager OpenConnect on Ubuntu 22.04 fails to conect to Palo Alto GlobalProtect VPN

2024-09-21 Thread Luís Infante da Câmara
*** This bug is a duplicate of bug 1969734 *** https://bugs.launchpad.net/bugs/1969734 ** This bug has been marked a duplicate of bug 1969734 [Jammy] NetworkManager-openconnect 1.2.6 not compatible with openconnect 8.20 -- You received this bug notification because you are a member of Ubu

[Bug 2076943] Re: Incorrect GPG signature file during autoinstall when using custom GPG key

2024-09-18 Thread Tiago Pasqualini da Silva
It is currently possible to achieve this by using templates, which is supported by curtin. This is currently not documented anywhere besides one of the examples: https://github.com/canonical/curtin/blob/master/examples/apt- source.yaml#L109 I have proposed a PR that adds documentation for this in

[Bug 1965988] Re: systemd-logind failed to idle channel 2 - kernel panic

2024-09-09 Thread Simony Santos da Costa
I have a DELL Inspiron-15-3511 and the same problem. I followed the blacklisting nouveau and worked. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1965988 Title: systemd-logind failed to idle channe

[Bug 2078374] [NEW] I tried to upgrade ubuntu then i got this error

2024-08-29 Thread Fernando da Silva Santos Villela
Public bug reported: Fail to upgrade to Ubuntu 24.04 ProblemType: Bug DistroRelease: Ubuntu 22.04 Package: ubuntu-release-upgrader-core 1:22.04.19 ProcVersionSignature: Ubuntu 5.15.0-119.129-generic 5.15.160 Uname: Linux 5.15.0-119-generic x86_64 NonfreeKernelModules: nvidia_modeset nvidia Apport

[Bug 2073580] [NEW] bug de vizualizacíon ubuntu

2024-07-19 Thread Jullien Da Rocha
Public bug reported: Hola Ubuntu, Posiblemente una problema en network-manager-openvpn-gnome. Despues de una upgrade a Ubuntu 24.10 hay un bug de vizualizacíon. La imagen es en archivo adjunto. Gracias ProblemType: Bug DistroRelease: Ubuntu 24.04 Package: network-manager-openvpn-gnome 1.10.2-4bu

[Bug 2072936] Re: Python3.12 SyntaxWarning

2024-07-14 Thread Jullien Da Rocha
** Changed in: terminator (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2072936 Title: Python3.12 SyntaxWarning To manage notifications about this bug go to:

[Bug 2072936] [NEW] Python3.12 SyntaxWarning

2024-07-12 Thread Jullien Da Rocha
Public bug reported: Puedo usar el terminator que funciona sin erros? ProblemType: Bug DistroRelease: Ubuntu 24.04 Package: terminator 2.1.3-1 ProcVersionSignature: Ubuntu 6.8.0-38.38-generic 6.8.8 Uname: Linux 6.8.0-38-generic x86_64 ApportVersion: 2.28.1-0ubuntu3 Architecture: amd64 CasperMD5Ch

[Bug 2065946] Re: UBSAN: array-index-out-of-bounds in /build/linux-hwe-6.5-ZV1Qen/linux-hwe-6.5-6.5.0

2024-05-18 Thread Luiz Carlos da Silveira Júnior
** Description changed: - This error occurred on my PC when booting Ubuntu from 22.04 in any + This error occurred on my PC when booting Ubuntu from 22.04/24.04 in any flavor, in Zorin and also with Pop!_OS 22.04. Looks like a new kernel issue. It seems to me that it has to do with Kernel

[Bug 2065946] [NEW] UBSAN: array-index-out-of-bounds in /build/linux-hwe-6.5-ZV1Qen/linux-hwe-6.5-6.5.0

2024-05-16 Thread Luiz Carlos da Silveira Júnior
Public bug reported: This error occurred on my PC when booting Ubuntu from 22.04 in any flavor, in Zorin and also with Pop!_OS 22.04. Looks like a new kernel issue. It seems to me that it has to do with Kernel 6.5, 6.8 +. Should I be worried about this? The problem does not occur in Fedora 39 o

[Bug 2065921] [NEW] Dualscreen fails since noble

2024-05-16 Thread Emmanuel DA MOTA
Public bug reported: Upgrade from 23.10 to 24.04 Now, dualscreen layout is wrong, the desktop's size is twice as it should be Also, text labels are hidden, i have to mouse over to show them ProblemType: Bug DistroRelease: Ubuntu 24.04 Package: xorg 1:7.7+23ubuntu3 ProcVersionSignature: Ubuntu 6.8

[Bug 2064289] [NEW] Requesting x86_64/AMD 64 vectorscan package

2024-04-30 Thread da-667
Public bug reported: Greetings! Recently, I was trying to build Cisco's Snort 3 on Ubuntu 24.04. Snort 3 can be compiled with support for hyperscan to enable better PCRE performance for network detection. In the past, using the libhyperscan- dev package worked fine. But now, it doesn't seem to wa

[Bug 1922654] Re: Apache Maven Multiple Security Bypass Vulnerabilities

2023-09-18 Thread Luís Infante da Câmara
** Patch added: "maven_focal.debdiff" https://bugs.launchpad.net/ubuntu/+source/maven/+bug/1922654/+attachment/5701761/+files/maven_focal.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bu

[Bug 1922654] Re: Apache Maven Multiple Security Bypass Vulnerabilities

2023-09-13 Thread Luís Infante da Câmara
** Also affects: maven-resolver (Ubuntu) Importance: Undecided Status: New ** Patch added: "maven-resolver_focal.debdiff" https://bugs.launchpad.net/ubuntu/+source/maven-resolver/+bug/1922654/+attachment/5700653/+files/maven-resolver_focal.debdiff -- You received this bug notificat

[Bug 1922654] Re: Apache Maven Multiple Security Bypass Vulnerabilities

2023-09-13 Thread Luís Infante da Câmara
** Patch added: "maven-resolver_jammy.debdiff" https://bugs.launchpad.net/ubuntu/+source/maven-resolver/+bug/1922654/+attachment/5700654/+files/maven-resolver_jammy.debdiff ** Changed in: maven-resolver (Ubuntu) Status: New => Fix Released -- You received this bug notification because

[Bug 1922654] Re: Apache Maven Multiple Security Bypass Vulnerabilities

2023-09-03 Thread Luís Infante da Câmara
** Changed in: maven (Ubuntu) Assignee: Luís Infante da Câmara (luis220413) => (unassigned) ** Patch added: "maven_jammy.debdiff" https://bugs.launchpad.net/ubuntu/+source/maven/+bug/1922654/+attachment/5697382/+files/maven_jammy.debdiff -- You received this bug notific

[Bug 1922654] Re: Apache Maven Multiple Security Bypass Vulnerabilities

2023-09-03 Thread Luís Infante da Câmara
** Patch added: "maven_focal.debdiff" https://bugs.launchpad.net/ubuntu/+source/maven/+bug/1922654/+attachment/5697379/+files/maven_focal.debdiff ** Changed in: maven (Ubuntu) Assignee: (unassigned) => Luís Infante da Câmara (luis220413) -- You received this bug notific

[Bug 1970779] Re: Upgrade to 2.36.7 for Focal and Jammy

2022-12-25 Thread Luís Infante da Câmara
** Changed in: wpewebkit (Ubuntu) Assignee: Luís Infante da Câmara (luis220413) => (unassigned) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1970779 Title: Upgrade to 2.36.7 for Fo

[Bug 1970779] Re: Upgrade to 2.36.7 for Focal and Jammy

2022-08-28 Thread Luís Cunha dos Reis Infante da Câmara
** Summary changed: - Upgrade to 2.36.6 for Focal and Jammy + Upgrade to 2.36.7 for Focal and Jammy ** Description changed: - I want to upgrade the versions in Focal and Jammy to 2.36.6 to fix + I want to upgrade the versions in Focal and Jammy to 2.36.7 to fix security issues and other bugs,

[Bug 1970779] Re: Upgrade to 2.36.6 for Focal and Jammy

2022-08-17 Thread Luís Cunha dos Reis Infante da Câmara
Test plan: 1. Add my PPA (https://launchpad.net/~luis220413/+archive/ubuntu/security-updates/) to a test system running Ubuntu 20.04 or 22.04 (both releases must be tested). 2. Install cog with "sudo apt install cog" 3. Run cog -P x11 https://ubuntu.com/ 4. Run cog -P headless https://ubuntu.com

[Bug 1970779] Re: Upgrade to 2.36.6 for Focal and Jammy

2022-08-14 Thread Luís Cunha dos Reis Infante da Câmara
There are 3 snaps that contain WPE WebKit: * https://snapcraft.io/wpe-webkit-mir-kiosk-with-delay * https://snapcraft.io/wpe-webkit-mir-kiosk * https://snapcraft.io/wpe-webkit-libs ** Changed in: wpewebkit (Ubuntu Focal) Status: New => Confirmed ** Changed in: wpewebkit (Ubuntu Jammy)

[Bug 1970779] Re: Upgrade to 2.36.6 for Focal and Jammy

2022-08-14 Thread Luís Cunha dos Reis Infante da Câmara
: wpewebkit (Ubuntu) Status: Fix Committed => In Progress ** Changed in: wpewebkit (Ubuntu) Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara (luis220413) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to t

[Bug 1970779] Re: Upgrade to 2.36.4 for Focal and Jammy

2022-08-07 Thread Luís Cunha dos Reis Infante da Câmara
WPE WebKit 2.36.6 was released today and I will package it next week (August 8-14). ** Summary changed: - Upgrade to 2.36.4 for Focal and Jammy + Upgrade to 2.36.6 for Focal and Jammy ** Description changed: - I want to upgrade the versions in Focal and Jammy to 2.36.4 to fix + [To be updated o

[Bug 1970779] Re: Upgrade to 2.36.4 for Focal and Jammy

2022-07-14 Thread Luís Cunha dos Reis Infante da Câmara
As I mentioned in the #ubuntu-security channel, to guarantee that we are not introducing issues, in addition to testing the package, only consider the changes in the Debian packaging tarball (ignoring the upstream changes). -- You received this bug notification because you are a member of Ubuntu

[Bug 1970779] Re: Upgrade to 2.36.4 for Focal and Jammy

2022-07-14 Thread Luís Cunha dos Reis Infante da Câmara
The patched source packages build successfully on all architectures. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1970779 Title: Upgrade to 2.36.4 for Focal and Jammy To manage notificatio

[Bug 1970779] Re: Upgrade to 2.36.4 for Focal and Jammy

2022-07-13 Thread Luís Cunha dos Reis Infante da Câmara
Impish will reach end-of-life tomorrow. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1970779 Title: Upgrade to 2.36.4 for Focal and Jammy To manage notifications about this bug go to: http

[Bug 1970779] Re: Upgrade to 2.36.4 for Focal, Impish and Jammy

2022-07-13 Thread Luís Cunha dos Reis Infante da Câmara
** Description changed: - I want to upgrade the versions in Focal, Impish and Jammy to 2.36.4 to - fix security issues and other bugs, as well as adding features that - increase compatibility with current websites. + I want to upgrade the versions in Focal and Jammy to 2.36.4 to fix + security iss

[Bug 1970779] Re: Upgrade to 2.36.4 for Focal, Impish and Jammy

2022-07-13 Thread Luís Cunha dos Reis Infante da Câmara
Given the first paragraph of comment #18, I just converted this bug back into a security update. ** Description changed: I want to upgrade the versions in Focal, Impish and Jammy to 2.36.4 to fix security issues and other bugs, as well as adding features that increase compatibility with cur

[Bug 1968922] Re: libnss3 is affected by CVE-2022-22747

2022-07-11 Thread Luís Cunha dos Reis Infante da Câmara
Fixed in versions 2:3.35-2ubuntu2.15 (18.04), 2:3.49.1-1ubuntu1.8 (20.04) and 2:3.68-1ubuntu1.2 (21.10). The version in Ubuntu 22.04 is not vulnerable. ** Changed in: nss (Ubuntu) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bu

[Bug 1970779] Re: Upgrade to 2.36.4 for Focal, Impish and Jammy

2022-07-05 Thread Luís Cunha dos Reis Infante da Câmara
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-22662 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-22677 ** Description changed: I want to upgrade the versions in Focal, Impish and Jammy to 2.36.4 to fix security issues and other bugs, as well as adding

[Bug 1970779] Re: Upgrade to 2.36.3 for Focal, Impish and Jammy

2022-07-05 Thread Luís Cunha dos Reis Infante da Câmara
Patched packages are building in my PPA: https://launchpad.net/~luis220413/+archive/ubuntu/security-updates. ** Summary changed: - Upgrade to 2.36.3 for Focal, Impish and Jammy + Upgrade to 2.36.4 for Focal, Impish and Jammy ** Description changed: - I want to upgrade the versions in Focal, Imp

[Bug 1970779] Re: Upgrade to 2.36.3 for Focal, Impish and Jammy

2022-07-05 Thread Luís Cunha dos Reis Infante da Câmara
Version 2.36.4 was released today. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1970779 Title: Upgrade to 2.36.3 for Focal, Impish and Jammy To manage notifications about this bug go to: h

[Bug 1970779] Re: Upgrade to 2.36.3 for Focal, Impish and Jammy

2022-06-29 Thread Luís Cunha dos Reis Infante da Câmara
The upstream project recommends updating the versions of WPE WebKit, especially when they include fixes for known security issues: https://lists.webkit.org/pipermail/webkit-wpe/2022-June/000522.html -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed

[Bug 1970779] Re: Upgrade to 2.36.3 for Focal, Impish and Jammy

2022-06-28 Thread Luís Cunha dos Reis Infante da Câmara
I have sent an email to the upstream mailing list (webkit-wpe) asking if anyone is using the WPE WebKit packages in Ubuntu in production: https://lists.webkit.org/pipermail/webkit-wpe/2022-June/000520.html -- You received this bug notification because you are a member of Ubuntu Bugs, which is sub

[Bug 1968922] Re: libnss3 is affected by CVE-2022-22747

2022-06-22 Thread Luís Cunha dos Reis Infante da Câmara
I requested to the security team that this CVE be fixed in Ubuntu and Marc Deslauriers (from the security team) replied: We rated this CVE priority to be "low", which means we will not fix it until more important security issues come up in NSS. -- You received this bug notification because you a

[Bug 1968922] Re: libnss3 is affected by CVE-2022-22747

2022-06-20 Thread Luís Cunha dos Reis Infante da Câmara
Version 2:3.49.1-1ubuntu1.7 was released after this bug was reported and does not contain a fix for this CVE. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1968922 Title: libnss3 is affected

[Bug 1970779] Re: Upgrade to 2.36.3 for Focal, Impish and Jammy

2022-06-17 Thread Luís Cunha dos Reis Infante da Câmara
We can use cog for testing that the CVEs are fixed, if necessary. Due to the exception in comment #18, I believe that this bug can go through the security sponsoring process. The snap https://snapcraft.io/wpe-webkit-mir-kiosk has been installed/used recently by a substantial number of users (accor

[Bug 1970779] Re: Upgrade to 2.36.3 for Focal, Impish and Jammy

2022-06-16 Thread Luís Cunha dos Reis Infante da Câmara
** Changed in: wpewebkit (Ubuntu) Assignee: Luís Cunha dos Reis Infante da Câmara (luis220413) => (unassigned) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1970779 Title: Upgrade

[Bug 1970779] Re: Upgrade to 2.36.3 for Focal, Impish and Jammy

2022-06-15 Thread Luís Cunha dos Reis Infante da Câmara
I have just transformed this bug into an Stable Release Update bug. ** Description changed: I want to upgrade the versions in Focal, Impish and Jammy to 2.36.3 to fix security issues and other bugs, as well as adding features that increase compatibility with current websites. The versi

[Bug 1970779] Re: Upgrade to 2.36.3 for Focal, Impish and Jammy

2022-06-15 Thread Luís Cunha dos Reis Infante da Câmara
** Description changed: + I want to upgrade the versions in Focal, Impish and Jammy to 2.36.3 to + fix security issues and other bugs, as well as adding features that + increase compatibility with current websites. + The version in Focal is affected by all vulnerabilities listed below. The

[Bug 1970779] Re: Multiple vulnerabilities in Focal, Impish and Jammy

2022-06-15 Thread Luís Cunha dos Reis Infante da Câmara
** Changed in: wpewebkit (Ubuntu) Status: Fix Committed => New ** Summary changed: - Multiple vulnerabilities in Focal, Impish and Jammy + Upgrade to 2.36.3 for Focal, Impish and Jammy -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to t

[Bug 1939281] Re: Please provide update for CVE-2021-36740 (VSV00007 Varnish HTTP/2 Request Smuggling Attack)

2022-06-08 Thread Luís Cunha dos Reis Infante da Câmara
** CVE removed: https://cve.mitre.org/cgi- bin/cvename.cgi?name=2019-20637 ** CVE removed: https://cve.mitre.org/cgi- bin/cvename.cgi?name=2020-11653 ** CVE removed: https://cve.mitre.org/cgi- bin/cvename.cgi?name=2022-23959 -- You received this bug notification because you are a member of Ubun

[Bug 1970507] Re: No security updates since release in all Ubuntu releases

2022-06-05 Thread Luís Cunha dos Reis Infante da Câmara
I am going through the last XSA (XSA-400) and will, if a local build is successful, add a patch for Focal tomorrow. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970507 Title: No security updates s

[Bug 1970507] Re: No security updates since release in all Ubuntu releases

2022-06-05 Thread Luís Cunha dos Reis Infante da Câmara
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-3639 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970507 Title: No security updates since release in all Ubuntu releases To manag

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-05 Thread Luís Cunha dos Reis Infante da Câmara
Complete log for all tests in 18.04. All .err files are either attached or in lena_test_errors.tar.xz. ** Attachment added: "ffmpeg_test_log" https://bugs.launchpad.net/ubuntu/+source/ffmpeg/+bug/1970674/+attachment/5594952/+files/ffmpeg_test_log -- You received this bug notification because

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-05 Thread Luís Cunha dos Reis Infante da Câmara
** Attachment added: "sub2video.err" https://bugs.launchpad.net/ubuntu/+source/ffmpeg/+bug/1970674/+attachment/5594951/+files/sub2video.err -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970674 Ti

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-05 Thread Luís Cunha dos Reis Infante da Câmara
Test force_key_frames is also failing on 18.04. TESTforce_key_frames --- /home/user/ffmpeg-3.4.11/tests/ref/fate/force_key_frames2022-05-14 00:07:14.0 +0100 +++ tests/data/fate/force_key_frames2022-06-04 22:55:25.002760714 +0100 @@ -1,4 +1,3 @@ -07567b9528b8de523faaf49e4e1e0fc

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-05 Thread Luís Cunha dos Reis Infante da Câmara
Test sub2video is taking 9 hours. Stack trace: (gdb) i s #0 0x7fff62bf5974 in clock_gettime () #1 0x7f88bdf30d06 in __GI___clock_gettime (clock_id=clock_id@entry=1, tp=tp@entry=0x7fff62bdeea0) at ../sysdeps/unix/clock_gettime.c:115 #2 0x7f88be7fa8d1 in av_gettime_relative () at src

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-04 Thread Luís Cunha dos Reis Infante da Câmara
The tests did not finish in 24 minutes and one test (sub2video) is taking 15 minutes. I will retest on 18.04 now and publish results tomorrow. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970674 Tit

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-04 Thread Luís Cunha dos Reis Infante da Câmara
The test failed on 18.04 due to an integrity issue when receiving the input file for the failed test. I will re-run the test suite now, but with the following commands (I only added the -k option to the last command): $ debuild -us -uc $ export LD_LIBRARY_PATH="libavcodec:libavdevice:libavfilter

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-04 Thread Luís Cunha dos Reis Infante da Câmara
Patch for typo in architecture name for Ubuntu 21.10 ** Patch added: "architecture_typo_impish.debdiff" https://bugs.launchpad.net/ubuntu/+source/ffmpeg/+bug/1970674/+attachment/5594797/+files/architecture_typo_impish.debdiff -- You received this bug notification because you are a member of

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-03 Thread Luís Cunha dos Reis Infante da Câmara
Running Lintian on the changes file for Ubuntu 22.04 (amd64) reports the following warnings: W: ffmpeg-dbgsym: elf-error In program headers: Unable to find program interpreter name [usr/lib/debug/.build-id/01/31a3a53a5037d9cfce0b08e65bdf645b5fc6a6.debug] W: ffmpeg-dbgsym: elf-error In program he

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-03 Thread Luís Cunha dos Reis Infante da Câmara
Patch for typo in architecture name for Ubuntu 22.04 ** Patch added: "architecture_typo_jammy.debdiff" https://bugs.launchpad.net/ubuntu/+source/ffmpeg/+bug/1970674/+attachment/5594759/+files/architecture_typo_jammy.debdiff -- You received this bug notification because you are a member of Ub

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-03 Thread Luís Cunha dos Reis Infante da Câmara
All tests from the upstream testsuite (FATE) pass on 22.04. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970674 Title: New bug fix releases 3.4.11, 4.2.7 and 4.4.2 To manage notifications about t

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-03 Thread Luís Cunha dos Reis Infante da Câmara
All tests from the upstream testsuite (FATE) pass on 21.10. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970674 Title: New bug fix releases 3.4.11, 4.2.7 and 4.4.2 To manage notifications about t

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-03 Thread Luís Cunha dos Reis Infante da Câmara
For the version in Ubuntu 21.10, Lintian reported a typo in an architecture name and that the upstream tarball is missing a signature. Please add the attached signature when uploading to the Ubuntu 21.10 and 22.04 archives. ** Attachment added: "ffmpeg-4.4.2.tar.xz.asc" https://bugs.launchpad

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-03 Thread Luís Cunha dos Reis Infante da Câmara
For 20.04, I have run the tests as follows (based on the same files as in 18.04, but of course in the source of 20.04): $ debuild -us -uc $ export LD_LIBRARY_PATH="libavcodec:libavdevice:libavfilter:libavformat:libavresample:libavutil:libpostproc:libswresample:libswscale" $ cd debian/standard $ m

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-03 Thread Luís Cunha dos Reis Infante da Câmara
For the version in Ubuntu 20.04, Lintian only reported that the upstream tarball is missing a signature. Please add the attached signature when uploading to the Ubuntu 20.04 archive. ** Attachment added: "ffmpeg-4.2.7.tar.xz.asc" https://bugs.launchpad.net/ubuntu/+source/ffmpeg/+bug/1970674/+

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-03 Thread Luís Cunha dos Reis Infante da Câmara
All tests from the upstream testsuite (FATE) pass on 20.04. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970674 Title: New bug fix releases 3.4.11, 4.2.7 and 4.4.2 To manage notifications about t

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-03 Thread Luís Cunha dos Reis Infante da Câmara
I have run the tests as follows (based on the instructions in doc/fate.texi): $ export LD_LIBRARY_PATH="libavcodec:libavdevice:libavfilter:libavformat:libavresample:libavutil:libpostproc:libswresample:libswscale" $ cd debian/standard $ make -j1 fate-rsync SAMPLES=fate-suite/ $ make -j1 fate SAMPLE

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-03 Thread Luís Cunha dos Reis Infante da Câmara
Test vsynth_lena-amv is failing in 18.04: the expected and actual input file hashes are different. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970674 Title: New bug fix releases 3.4.11, 4.2.7 and

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-03 Thread Luís Cunha dos Reis Infante da Câmara
Lintian only reported that the upstream tarball is missing a signature. Please add the attached signature when uploading to the Ubuntu 18.04 archive. ** Attachment added: "ffmpeg-3.4.11.tar.xz.asc" https://bugs.launchpad.net/ubuntu/+source/ffmpeg/+bug/1970674/+attachment/5594576/+files/ffmpeg

[Bug 1971056] Re: CVE-2021-3850

2022-06-02 Thread Luís Cunha dos Reis Infante da Câmara
** Changed in: libphp-adodb (Ubuntu) Status: New => In Progress ** Changed in: libphp-adodb (Ubuntu) Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara (luis220413) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscri

[Bug 1971004] Re: CVE-2022-23614

2022-06-02 Thread Luís Cunha dos Reis Infante da Câmara
** Changed in: php-twig (Ubuntu) Status: New => In Progress ** Changed in: twig (Ubuntu) Status: New => In Progress ** Changed in: php-twig (Ubuntu) Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara (luis220413) ** Changed in: twig (Ubuntu)

[Bug 1971107] Re: Versions in Focal, Impish and Jammy are vulnerable to CVE-2022-26661 and CVE-2022-26662

2022-06-01 Thread Luís Cunha dos Reis Infante da Câmara
** Changed in: tryton-proteus (Ubuntu) Status: Confirmed => In Progress ** Changed in: tryton-server (Ubuntu) Status: Confirmed => In Progress ** Changed in: tryton-proteus (Ubuntu) Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara (luis220413) ** C

[Bug 1970961] Re: Version in Bionic has multiple vulnerabilities

2022-06-01 Thread Luís Cunha dos Reis Infante da Câmara
** Changed in: faad2 (Ubuntu) Status: New => In Progress ** Changed in: faad2 (Ubuntu) Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara (luis220413) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1970507] Re: No security updates since release in all Ubuntu releases

2022-06-01 Thread Luís Cunha dos Reis Infante da Câmara
** CVE removed: https://cve.mitre.org/cgi- bin/cvename.cgi?name=2021-26934 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970507 Title: No security updates since release in all Ubuntu releases To m

[Bug 1970783] Re: Multiple vulnerabilities in Bionic

2022-06-01 Thread Luís Cunha dos Reis Infante da Câmara
ged in: webkit2gtk (Ubuntu) Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara (luis220413) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970783 Title: Multiple vulnerabilit

[Bug 1971185] Re: Multiple vulnerabilities in Bionic, Focal, Impish and Jammy

2022-05-31 Thread Luís Cunha dos Reis Infante da Câmara
** Patch added: "spip_jammy.debdiff" https://bugs.launchpad.net/ubuntu/+source/spip/+bug/1971185/+attachment/5594136/+files/spip_jammy.debdiff ** Changed in: spip (Ubuntu) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bug

[Bug 1971185] Re: Multiple vulnerabilities in Bionic, Focal, Impish and Jammy

2022-05-31 Thread Luís Cunha dos Reis Infante da Câmara
** Patch added: "spip_impish.debdiff" https://bugs.launchpad.net/ubuntu/+source/spip/+bug/1971185/+attachment/5594134/+files/spip_impish.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/197118

[Bug 1971185] Re: Multiple vulnerabilities in Bionic, Focal, Impish and Jammy

2022-05-31 Thread Luís Cunha dos Reis Infante da Câmara
** Patch added: "spip_focal.debdiff" https://bugs.launchpad.net/ubuntu/+source/spip/+bug/1971185/+attachment/5594133/+files/spip_focal.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1971185

[Bug 1971185] Re: Multiple vulnerabilities in Bionic, Focal, Impish and Jammy

2022-05-31 Thread Luís Cunha dos Reis Infante da Câmara
ntu) Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara (luis220413) ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-28959 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-28960 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-28961 -

[Bug 1971185] Re: Multiple vulnerabilities in Bionic, Focal, Impish and Jammy

2022-05-31 Thread Luís Cunha dos Reis Infante da Câmara
** Patch added: "spip_bionic.debdiff" https://bugs.launchpad.net/ubuntu/+source/spip/+bug/1971185/+attachment/5594128/+files/spip_bionic.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/197118

[Bug 1970779] Re: Multiple vulnerabilities in Focal, Impish and Jammy

2022-05-31 Thread Luís Cunha dos Reis Infante da Câmara
The upstream project issued a security advisory today: https://wpewebkit.org/security/WSA-2022-0005.html. The changelog in the patched packages was updated just now. These patched packages are currently building in my PPA (https://launchpad.net/~luis220413/+archive/ubuntu/security-updates), as of

[Bug 1970779] Re: Multiple vulnerabilities in Focal and Impish

2022-05-30 Thread Luís Cunha dos Reis Infante da Câmara
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-26700 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-26709 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-26717 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-26716 ** CVE

[Bug 1970779] Re: Multiple vulnerabilities in Focal and Impish

2022-05-29 Thread Luís Cunha dos Reis Infante da Câmara
Due to a out-of-memory issue when building the package in Jammy, I needed to increase swap and retry the build. I uploaded the Jammy source package just now. Patched source packages are available in my PPA (https://launchpad.net/~luis220413/+archive/ubuntu/security-updates). ** Patch removed: "wp

[Bug 1970507] Re: No security updates since release in all Ubuntu releases

2022-05-29 Thread Luís Cunha dos Reis Infante da Câmara
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-26358 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-26359 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-26360 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-26361 -- You

[Bug 1970507] Re: No security updates since release in all Ubuntu releases

2022-05-29 Thread Luís Cunha dos Reis Infante da Câmara
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-26357 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970507 Title: No security updates since release in all Ubuntu releases To mana

[Bug 1970507] Re: No security updates since release in all Ubuntu releases

2022-05-29 Thread Luís Cunha dos Reis Infante da Câmara
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-26356 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970507 Title: No security updates since release in all Ubuntu releases To mana

[Bug 1976184] Re: Linux PV device frontends vulnerable to attacks by backends

2022-05-29 Thread Luís Cunha dos Reis Infante da Câmara
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-23042 ** Description changed: The packages listed above are vulnerable to the CVEs below in at least - one Ubuntu release, as stated in the Ubuntu CVE Tracker. + one Ubuntu release, as stated in the Ubuntu CVE Tracker, except for

[Bug 1976184] Re: Linux PV device frontends vulnerable to attacks by backends

2022-05-29 Thread Luís Cunha dos Reis Infante da Câmara
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-23041 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976184 Title: Linux PV device frontends vulnerable to attacks by backends To m

[Bug 1976184] Re: Linux PV device frontends vulnerable to attacks by backends

2022-05-29 Thread Luís Cunha dos Reis Infante da Câmara
** Also affects: linux-azure-4.15 (Ubuntu) Importance: Undecided Status: New ** Also affects: linux-dell300x (Ubuntu) Importance: Undecided Status: New ** Also affects: linux-gcp-4.15 (Ubuntu) Importance: Undecided Status: New ** Also affects: linux-snapdragon (Ubun

[Bug 1976184] Re: Linux PV device frontends vulnerable to attacks by backends

2022-05-29 Thread Luís Cunha dos Reis Infante da Câmara
** Summary changed: - CVE-2022-23036, CVE-2022-23037 and CVE-2022-23038 + Linux PV device frontends vulnerable to attacks by backends ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-23039 ** Description changed: - The following packages are vulnerable to CVE-2022-23036, CVE-20

[Bug 1976184] Re: CVE-2022-23036 and CVE-2022-23037

2022-05-29 Thread Luís Cunha dos Reis Infante da Câmara
** Summary changed: - CVE-2022-23036 + CVE-2022-23036 and CVE-2022-23037 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-23036 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-23037 ** Summary changed: - CVE-2022-23036 and CVE-2022-23037 + CVE-2022-23036, CVE

  1   2   3   4   5   6   7   8   9   10   >