Public bug reported:
i don't know much about the details, only thing i can say is that i
recently started using ubuntu by dual booting with windows, i'm still a
beginner at that, the installation process was also not fully complete
due to some issues with something called Yaru, but i don't know if
** Merge proposal linked:
https://code.launchpad.net/~tiago.pasqualini/curtin/+git/curtin/+merge/474394
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2076943
Title:
Incorrect GPG signature file d
** Merge proposal linked:
https://code.launchpad.net/~tiago.pasqualini/curtin/+git/curtin/+merge/473681
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2076943
Title:
Incorrect GPG signature file d
** Changed in: vlc (Ubuntu)
Assignee: Luís Infante da Câmara (luis220413) => (unassigned)
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
ht
This is now fixed, but it now fails to build in Oracular on all
architectures due to two new issues.
** Changed in: xen (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.lau
** Package changed: gimp (Ubuntu) => libgphoto2 (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1094888
Title:
GIMP: Could not mount Canon Digital Camera
To manage notifications about this b
All of these CVEs are now fixed in all of these releases, including
Trusty, that is now end-of-life.
** Summary changed:
- Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal and Jammy
+ Multiple vulnerabilities in Xenial, Bionic, Focal and Jammy
** Description changed:
- The versions in
** Changed in: tryton-proteus (Ubuntu)
Status: In Progress => Confirmed
** Changed in: tryton-server (Ubuntu)
Status: In Progress => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bu
** Changed in: libphp-adodb (Ubuntu)
Status: In Progress => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971056
Title:
CVE-2021-3850
To manage notifications about this bug go to:
** Changed in: haskell-call-stack (Ubuntu)
Status: Fix Committed => Fix Released
** Changed in: haskell-diff (Ubuntu)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.lau
All priority-Medium CVEs in Bionic are now fixed. (There are no CVEs in
this package in Bionic with High or Critical priority.)
** Changed in: faad2 (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribe
This is now fixed in Ubuntu 20.04 in the security pocket, in Ubuntu
22.04 through Ubuntu Pro, and in the development release.
** Changed in: jqueryui (Ubuntu)
Status: Confirmed => Fix Released
** Information type changed from Private Security to Public Security
--
You received this bug n
Ubuntu 18.04 is now in ESM.
** Changed in: node-deepmerge (Ubuntu)
Status: In Progress => Invalid
** Changed in: node-rollup (Ubuntu)
Status: In Progress => Invalid
** Summary changed:
- Backport to Ubuntu 18.04 (and in some cases 20.04)
+ Backport to Ubuntu 20.04
** No longer af
** Changed in: faad2 (Ubuntu)
Status: In Progress => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970961
Title:
Version in Bionic has multiple vulnerabilities
To manage notificat
** Changed in: php-twig (Ubuntu)
Status: In Progress => Confirmed
** Changed in: twig (Ubuntu)
Status: In Progress => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971004
Tit
** Changed in: qt6-base (Ubuntu)
Assignee: Luís Infante da Câmara (luis220413) => (unassigned)
** Changed in: qtbase-opensource-src (Ubuntu)
Assignee: Luís Infante da Câmara (luis220413) => (unassigned)
--
You received this bug notification because you are a member of Ubunt
** Changed in: intel-mediasdk (Ubuntu)
Assignee: Luís Infante da Câmara (luis220413) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970637
Title:
ffmpeg depends on lib
*** This bug is a duplicate of bug 1969734 ***
https://bugs.launchpad.net/bugs/1969734
** This bug has been marked a duplicate of bug 1969734
[Jammy] NetworkManager-openconnect 1.2.6 not compatible with openconnect 8.20
--
You received this bug notification because you are a member of Ubu
It is currently possible to achieve this by using templates, which is
supported by curtin. This is currently not documented anywhere besides
one of the examples:
https://github.com/canonical/curtin/blob/master/examples/apt-
source.yaml#L109
I have proposed a PR that adds documentation for this in
I have a DELL Inspiron-15-3511 and the same problem. I followed the
blacklisting nouveau and worked.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1965988
Title:
systemd-logind failed to idle channe
Public bug reported:
Fail to upgrade to Ubuntu 24.04
ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: ubuntu-release-upgrader-core 1:22.04.19
ProcVersionSignature: Ubuntu 5.15.0-119.129-generic 5.15.160
Uname: Linux 5.15.0-119-generic x86_64
NonfreeKernelModules: nvidia_modeset nvidia
Apport
Public bug reported:
Hola Ubuntu,
Posiblemente una problema en network-manager-openvpn-gnome.
Despues de una upgrade a Ubuntu 24.10 hay un bug de vizualizacíon.
La imagen es en archivo adjunto.
Gracias
ProblemType: Bug
DistroRelease: Ubuntu 24.04
Package: network-manager-openvpn-gnome 1.10.2-4bu
** Changed in: terminator (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072936
Title:
Python3.12 SyntaxWarning
To manage notifications about this bug go to:
Public bug reported:
Puedo usar el terminator que funciona sin erros?
ProblemType: Bug
DistroRelease: Ubuntu 24.04
Package: terminator 2.1.3-1
ProcVersionSignature: Ubuntu 6.8.0-38.38-generic 6.8.8
Uname: Linux 6.8.0-38-generic x86_64
ApportVersion: 2.28.1-0ubuntu3
Architecture: amd64
CasperMD5Ch
** Description changed:
- This error occurred on my PC when booting Ubuntu from 22.04 in any
+ This error occurred on my PC when booting Ubuntu from 22.04/24.04 in any
flavor, in Zorin and also with Pop!_OS 22.04.
Looks like a new kernel issue. It seems to me that it has to do with
Kernel
Public bug reported:
This error occurred on my PC when booting Ubuntu from 22.04 in any
flavor, in Zorin and also with Pop!_OS 22.04.
Looks like a new kernel issue. It seems to me that it has to do with
Kernel 6.5, 6.8 +.
Should I be worried about this?
The problem does not occur in Fedora 39 o
Public bug reported:
Upgrade from 23.10 to 24.04
Now, dualscreen layout is wrong, the desktop's size is twice as it should be
Also, text labels are hidden, i have to mouse over to show them
ProblemType: Bug
DistroRelease: Ubuntu 24.04
Package: xorg 1:7.7+23ubuntu3
ProcVersionSignature: Ubuntu 6.8
Public bug reported:
Greetings!
Recently, I was trying to build Cisco's Snort 3 on Ubuntu 24.04. Snort 3
can be compiled with support for hyperscan to enable better PCRE
performance for network detection. In the past, using the libhyperscan-
dev package worked fine. But now, it doesn't seem to wa
** Patch added: "maven_focal.debdiff"
https://bugs.launchpad.net/ubuntu/+source/maven/+bug/1922654/+attachment/5701761/+files/maven_focal.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bu
** Also affects: maven-resolver (Ubuntu)
Importance: Undecided
Status: New
** Patch added: "maven-resolver_focal.debdiff"
https://bugs.launchpad.net/ubuntu/+source/maven-resolver/+bug/1922654/+attachment/5700653/+files/maven-resolver_focal.debdiff
--
You received this bug notificat
** Patch added: "maven-resolver_jammy.debdiff"
https://bugs.launchpad.net/ubuntu/+source/maven-resolver/+bug/1922654/+attachment/5700654/+files/maven-resolver_jammy.debdiff
** Changed in: maven-resolver (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because
** Changed in: maven (Ubuntu)
Assignee: Luís Infante da Câmara (luis220413) => (unassigned)
** Patch added: "maven_jammy.debdiff"
https://bugs.launchpad.net/ubuntu/+source/maven/+bug/1922654/+attachment/5697382/+files/maven_jammy.debdiff
--
You received this bug notific
** Patch added: "maven_focal.debdiff"
https://bugs.launchpad.net/ubuntu/+source/maven/+bug/1922654/+attachment/5697379/+files/maven_focal.debdiff
** Changed in: maven (Ubuntu)
Assignee: (unassigned) => Luís Infante da Câmara (luis220413)
--
You received this bug notific
** Changed in: wpewebkit (Ubuntu)
Assignee: Luís Infante da Câmara (luis220413) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1970779
Title:
Upgrade to 2.36.7 for Fo
** Summary changed:
- Upgrade to 2.36.6 for Focal and Jammy
+ Upgrade to 2.36.7 for Focal and Jammy
** Description changed:
- I want to upgrade the versions in Focal and Jammy to 2.36.6 to fix
+ I want to upgrade the versions in Focal and Jammy to 2.36.7 to fix
security issues and other bugs,
Test plan:
1. Add my PPA
(https://launchpad.net/~luis220413/+archive/ubuntu/security-updates/) to a test
system running Ubuntu 20.04 or 22.04 (both releases must be tested).
2. Install cog with "sudo apt install cog"
3. Run cog -P x11 https://ubuntu.com/
4. Run cog -P headless https://ubuntu.com
There are 3 snaps that contain WPE WebKit:
* https://snapcraft.io/wpe-webkit-mir-kiosk-with-delay
* https://snapcraft.io/wpe-webkit-mir-kiosk
* https://snapcraft.io/wpe-webkit-libs
** Changed in: wpewebkit (Ubuntu Focal)
Status: New => Confirmed
** Changed in: wpewebkit (Ubuntu Jammy)
: wpewebkit (Ubuntu)
Status: Fix Committed => In Progress
** Changed in: wpewebkit (Ubuntu)
Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara
(luis220413)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to t
WPE WebKit 2.36.6 was released today and I will package it next week
(August 8-14).
** Summary changed:
- Upgrade to 2.36.4 for Focal and Jammy
+ Upgrade to 2.36.6 for Focal and Jammy
** Description changed:
- I want to upgrade the versions in Focal and Jammy to 2.36.4 to fix
+ [To be updated o
As I mentioned in the #ubuntu-security channel, to guarantee that we are
not introducing issues, in addition to testing the package, only
consider the changes in the Debian packaging tarball (ignoring the
upstream changes).
--
You received this bug notification because you are a member of Ubuntu
The patched source packages build successfully on all architectures.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1970779
Title:
Upgrade to 2.36.4 for Focal and Jammy
To manage notificatio
Impish will reach end-of-life tomorrow.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1970779
Title:
Upgrade to 2.36.4 for Focal and Jammy
To manage notifications about this bug go to:
http
** Description changed:
- I want to upgrade the versions in Focal, Impish and Jammy to 2.36.4 to
- fix security issues and other bugs, as well as adding features that
- increase compatibility with current websites.
+ I want to upgrade the versions in Focal and Jammy to 2.36.4 to fix
+ security iss
Given the first paragraph of comment #18, I just converted this bug back
into a security update.
** Description changed:
I want to upgrade the versions in Focal, Impish and Jammy to 2.36.4 to
fix security issues and other bugs, as well as adding features that
increase compatibility with cur
Fixed in versions 2:3.35-2ubuntu2.15 (18.04), 2:3.49.1-1ubuntu1.8
(20.04) and 2:3.68-1ubuntu1.2 (21.10). The version in Ubuntu 22.04 is
not vulnerable.
** Changed in: nss (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bu
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-22662
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-22677
** Description changed:
I want to upgrade the versions in Focal, Impish and Jammy to 2.36.4 to
fix security issues and other bugs, as well as adding
Patched packages are building in my PPA:
https://launchpad.net/~luis220413/+archive/ubuntu/security-updates.
** Summary changed:
- Upgrade to 2.36.3 for Focal, Impish and Jammy
+ Upgrade to 2.36.4 for Focal, Impish and Jammy
** Description changed:
- I want to upgrade the versions in Focal, Imp
Version 2.36.4 was released today.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1970779
Title:
Upgrade to 2.36.3 for Focal, Impish and Jammy
To manage notifications about this bug go to:
h
The upstream project recommends updating the versions of WPE WebKit,
especially when they include fixes for known security issues:
https://lists.webkit.org/pipermail/webkit-wpe/2022-June/000522.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
I have sent an email to the upstream mailing list (webkit-wpe) asking if
anyone is using the WPE WebKit packages in Ubuntu in production:
https://lists.webkit.org/pipermail/webkit-wpe/2022-June/000520.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is sub
I requested to the security team that this CVE be fixed in Ubuntu and
Marc Deslauriers (from the security team) replied:
We rated this CVE priority to be "low", which means we will not fix it until
more important security issues come up in NSS.
--
You received this bug notification because you a
Version 2:3.49.1-1ubuntu1.7 was released after this bug was reported and
does not contain a fix for this CVE.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1968922
Title:
libnss3 is affected
We can use cog for testing that the CVEs are fixed, if necessary. Due to
the exception in comment #18, I believe that this bug can go through the
security sponsoring process.
The snap https://snapcraft.io/wpe-webkit-mir-kiosk has been
installed/used recently by a substantial number of users (accor
** Changed in: wpewebkit (Ubuntu)
Assignee: Luís Cunha dos Reis Infante da Câmara (luis220413) =>
(unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1970779
Title:
Upgrade
I have just transformed this bug into an Stable Release Update bug.
** Description changed:
I want to upgrade the versions in Focal, Impish and Jammy to 2.36.3 to
fix security issues and other bugs, as well as adding features that
increase compatibility with current websites.
The versi
** Description changed:
+ I want to upgrade the versions in Focal, Impish and Jammy to 2.36.3 to
+ fix security issues and other bugs, as well as adding features that
+ increase compatibility with current websites.
+
The version in Focal is affected by all vulnerabilities listed below.
The
** Changed in: wpewebkit (Ubuntu)
Status: Fix Committed => New
** Summary changed:
- Multiple vulnerabilities in Focal, Impish and Jammy
+ Upgrade to 2.36.3 for Focal, Impish and Jammy
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to t
** CVE removed: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2019-20637
** CVE removed: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2020-11653
** CVE removed: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2022-23959
--
You received this bug notification because you are a member of Ubun
I am going through the last XSA (XSA-400) and will, if a local build is
successful, add a patch for Focal tomorrow.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970507
Title:
No security updates s
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-3639
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970507
Title:
No security updates since release in all Ubuntu releases
To manag
Complete log for all tests in 18.04. All .err files are either attached
or in lena_test_errors.tar.xz.
** Attachment added: "ffmpeg_test_log"
https://bugs.launchpad.net/ubuntu/+source/ffmpeg/+bug/1970674/+attachment/5594952/+files/ffmpeg_test_log
--
You received this bug notification because
** Attachment added: "sub2video.err"
https://bugs.launchpad.net/ubuntu/+source/ffmpeg/+bug/1970674/+attachment/5594951/+files/sub2video.err
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970674
Ti
Test force_key_frames is also failing on 18.04.
TESTforce_key_frames
--- /home/user/ffmpeg-3.4.11/tests/ref/fate/force_key_frames2022-05-14
00:07:14.0 +0100
+++ tests/data/fate/force_key_frames2022-06-04 22:55:25.002760714 +0100
@@ -1,4 +1,3 @@
-07567b9528b8de523faaf49e4e1e0fc
Test sub2video is taking 9 hours.
Stack trace:
(gdb) i s
#0 0x7fff62bf5974 in clock_gettime ()
#1 0x7f88bdf30d06 in __GI___clock_gettime (clock_id=clock_id@entry=1,
tp=tp@entry=0x7fff62bdeea0) at ../sysdeps/unix/clock_gettime.c:115
#2 0x7f88be7fa8d1 in av_gettime_relative () at src
The tests did not finish in 24 minutes and one test (sub2video) is
taking 15 minutes. I will retest on 18.04 now and publish results
tomorrow.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970674
Tit
The test failed on 18.04 due to an integrity issue when receiving the
input file for the failed test.
I will re-run the test suite now, but with the following commands (I only added
the -k option to the last command):
$ debuild -us -uc
$ export
LD_LIBRARY_PATH="libavcodec:libavdevice:libavfilter
Patch for typo in architecture name for Ubuntu 21.10
** Patch added: "architecture_typo_impish.debdiff"
https://bugs.launchpad.net/ubuntu/+source/ffmpeg/+bug/1970674/+attachment/5594797/+files/architecture_typo_impish.debdiff
--
You received this bug notification because you are a member of
Running Lintian on the changes file for Ubuntu 22.04 (amd64) reports the
following warnings:
W: ffmpeg-dbgsym: elf-error In program headers: Unable to find program
interpreter name
[usr/lib/debug/.build-id/01/31a3a53a5037d9cfce0b08e65bdf645b5fc6a6.debug]
W: ffmpeg-dbgsym: elf-error In program he
Patch for typo in architecture name for Ubuntu 22.04
** Patch added: "architecture_typo_jammy.debdiff"
https://bugs.launchpad.net/ubuntu/+source/ffmpeg/+bug/1970674/+attachment/5594759/+files/architecture_typo_jammy.debdiff
--
You received this bug notification because you are a member of Ub
All tests from the upstream testsuite (FATE) pass on 22.04.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970674
Title:
New bug fix releases 3.4.11, 4.2.7 and 4.4.2
To manage notifications about t
All tests from the upstream testsuite (FATE) pass on 21.10.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970674
Title:
New bug fix releases 3.4.11, 4.2.7 and 4.4.2
To manage notifications about t
For the version in Ubuntu 21.10, Lintian reported a typo in an
architecture name and that the upstream tarball is missing a signature.
Please add the attached signature when uploading to the Ubuntu 21.10 and
22.04 archives.
** Attachment added: "ffmpeg-4.4.2.tar.xz.asc"
https://bugs.launchpad
For 20.04, I have run the tests as follows (based on the same files as
in 18.04, but of course in the source of 20.04):
$ debuild -us -uc
$ export
LD_LIBRARY_PATH="libavcodec:libavdevice:libavfilter:libavformat:libavresample:libavutil:libpostproc:libswresample:libswscale"
$ cd debian/standard
$ m
For the version in Ubuntu 20.04, Lintian only reported that the upstream
tarball is missing a signature.
Please add the attached signature when uploading to the Ubuntu 20.04
archive.
** Attachment added: "ffmpeg-4.2.7.tar.xz.asc"
https://bugs.launchpad.net/ubuntu/+source/ffmpeg/+bug/1970674/+
All tests from the upstream testsuite (FATE) pass on 20.04.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970674
Title:
New bug fix releases 3.4.11, 4.2.7 and 4.4.2
To manage notifications about t
I have run the tests as follows (based on the instructions in doc/fate.texi):
$ export
LD_LIBRARY_PATH="libavcodec:libavdevice:libavfilter:libavformat:libavresample:libavutil:libpostproc:libswresample:libswscale"
$ cd debian/standard
$ make -j1 fate-rsync SAMPLES=fate-suite/
$ make -j1 fate SAMPLE
Test vsynth_lena-amv is failing in 18.04: the expected and actual input
file hashes are different.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970674
Title:
New bug fix releases 3.4.11, 4.2.7 and
Lintian only reported that the upstream tarball is missing a signature.
Please add the attached signature when uploading to the Ubuntu 18.04
archive.
** Attachment added: "ffmpeg-3.4.11.tar.xz.asc"
https://bugs.launchpad.net/ubuntu/+source/ffmpeg/+bug/1970674/+attachment/5594576/+files/ffmpeg
** Changed in: libphp-adodb (Ubuntu)
Status: New => In Progress
** Changed in: libphp-adodb (Ubuntu)
Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara
(luis220413)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscri
** Changed in: php-twig (Ubuntu)
Status: New => In Progress
** Changed in: twig (Ubuntu)
Status: New => In Progress
** Changed in: php-twig (Ubuntu)
Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara
(luis220413)
** Changed in: twig (Ubuntu)
** Changed in: tryton-proteus (Ubuntu)
Status: Confirmed => In Progress
** Changed in: tryton-server (Ubuntu)
Status: Confirmed => In Progress
** Changed in: tryton-proteus (Ubuntu)
Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara
(luis220413)
** C
** Changed in: faad2 (Ubuntu)
Status: New => In Progress
** Changed in: faad2 (Ubuntu)
Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara
(luis220413)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** CVE removed: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2021-26934
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970507
Title:
No security updates since release in all Ubuntu releases
To m
ged in: webkit2gtk (Ubuntu)
Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara
(luis220413)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970783
Title:
Multiple vulnerabilit
** Patch added: "spip_jammy.debdiff"
https://bugs.launchpad.net/ubuntu/+source/spip/+bug/1971185/+attachment/5594136/+files/spip_jammy.debdiff
** Changed in: spip (Ubuntu)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bug
** Patch added: "spip_impish.debdiff"
https://bugs.launchpad.net/ubuntu/+source/spip/+bug/1971185/+attachment/5594134/+files/spip_impish.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/197118
** Patch added: "spip_focal.debdiff"
https://bugs.launchpad.net/ubuntu/+source/spip/+bug/1971185/+attachment/5594133/+files/spip_focal.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971185
ntu)
Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara
(luis220413)
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-28959
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-28960
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-28961
-
** Patch added: "spip_bionic.debdiff"
https://bugs.launchpad.net/ubuntu/+source/spip/+bug/1971185/+attachment/5594128/+files/spip_bionic.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/197118
The upstream project issued a security advisory today:
https://wpewebkit.org/security/WSA-2022-0005.html. The changelog in the
patched packages was updated just now.
These patched packages are currently building in my PPA
(https://launchpad.net/~luis220413/+archive/ubuntu/security-updates), as
of
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-26700
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-26709
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-26717
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-26716
** CVE
Due to a out-of-memory issue when building the package in Jammy, I
needed to increase swap and retry the build. I uploaded the Jammy source
package just now.
Patched source packages are available in my PPA
(https://launchpad.net/~luis220413/+archive/ubuntu/security-updates).
** Patch removed: "wp
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-26358
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-26359
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-26360
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-26361
--
You
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-26357
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970507
Title:
No security updates since release in all Ubuntu releases
To mana
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-26356
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970507
Title:
No security updates since release in all Ubuntu releases
To mana
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-23042
** Description changed:
The packages listed above are vulnerable to the CVEs below in at least
- one Ubuntu release, as stated in the Ubuntu CVE Tracker.
+ one Ubuntu release, as stated in the Ubuntu CVE Tracker, except for
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-23041
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1976184
Title:
Linux PV device frontends vulnerable to attacks by backends
To m
** Also affects: linux-azure-4.15 (Ubuntu)
Importance: Undecided
Status: New
** Also affects: linux-dell300x (Ubuntu)
Importance: Undecided
Status: New
** Also affects: linux-gcp-4.15 (Ubuntu)
Importance: Undecided
Status: New
** Also affects: linux-snapdragon (Ubun
** Summary changed:
- CVE-2022-23036, CVE-2022-23037 and CVE-2022-23038
+ Linux PV device frontends vulnerable to attacks by backends
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-23039
** Description changed:
- The following packages are vulnerable to CVE-2022-23036, CVE-20
** Summary changed:
- CVE-2022-23036
+ CVE-2022-23036 and CVE-2022-23037
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-23036
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-23037
** Summary changed:
- CVE-2022-23036 and CVE-2022-23037
+ CVE-2022-23036, CVE
1 - 100 of 1532 matches
Mail list logo