[Bug 2097605] Re: [SRU] Squid: Ceph new point release 19.2.1

2025-06-12 Thread Tiago Pasqualini da Silva
As per previous comments, the verification failed for the Noble package in proposed. There is a fix that can be added on top of that package in the following PPA: https://launchpad.net/~lmlogiudice/+archive/ubuntu/ceph-1921-noble ** Tags removed: verification-needed-noble ** Tags added: verificati

[Bug 2102680] Re: Installation of AppArmor on a 6.14 kernel produces error message "Illegal number: yes"

2025-05-12 Thread Claudio da Silva Junior
I change the code to: check_userns() { userns_restricted=$(sysctl -e -n kernel.apparmor_restrict_unprivileged_userns) unconfined_userns=$([ -f /sys/kernel/security/apparmor/features/policy/unconfined_restrictions/userns ] && cat /sys/kernel/security/apparmor/features/policy/unc

[Bug 2102680] Re: Installation of AppArmor on a 6.14 kernel produces error message "Illegal number: yes"

2025-05-12 Thread Claudio da Silva Junior
This problem is not solved with the change [ "$unconfined_users" = "NO" ] in the last comment. If you look in the code, you see this: check_userns() { userns_restricted=$(sysctl -e -n kernel.apparmor_restrict_unprivileged_userns) unconfined_userns=$([ -f /sys/kernel/security/app

[Bug 2109885] [NEW] Tried to create a new image from the welcome menu by clicking on the Create button, and the application crashed.

2025-05-03 Thread Appo Da
Public bug reported: I tried to create a new image from the welcome menu by clicking on the Create button, and the application crashed. The popup window to select the dimensions of the new image opened successfully, I put 16 by 16 and when I created the image GIMP 3 crashed. I'm on Kubuntu. Here

[Bug 2049299] Re: ibus-extension-gtk3 crashed with SIGABRT in g_assertion_message()

2025-04-12 Thread Luís Infante da Câmara
*** This bug is a duplicate of bug 1944430 *** https://bugs.launchpad.net/bugs/1944430 ** Information type changed from Private to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2049299 Tit

[Bug 2106321] Re: Can not open usb storage from dock icon

2025-04-06 Thread Emmanuel DA MOTA
** Summary changed: - Can not open usb storage + Can not open usb storage from dock icon -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2106321 Title: Can not open usb storage from dock icon To man

[Bug 2106321] [NEW] Can not open usb storage

2025-04-06 Thread Emmanuel DA MOTA
Public bug reported: Plugged 2 different usb keys When i click on the icon in the dock, nothing happens here the message avril 06 11:28:55 pc1 kernel: usb 1-1.3: new high-speed USB device number 9 using ehci-pci avril 06 11:28:55 pc1 kernel: usb 1-1.3: New USB device found, idVendor=058f, idP

[Bug 2106255] [NEW] Erro de renderizar video no youtube

2025-04-04 Thread André Siqueira Soares da Silva
Public bug reported: Varias vezes esta tendo problemas ao renderizar videos no youtube com o navegador chrome. esta funcionando e do nada para. ProblemType: Bug DistroRelease: Ubuntu 24.04 Package: xorg 1:7.7+23ubuntu3 ProcVersionSignature: Ubuntu 6.11.0-21.21~24.04.1-generic 6.11.11 Uname: Linux

[Bug 2095041] [NEW] rsync error using -H after update

2025-01-15 Thread Paulo da Silva
Public bug reported: After updating from rsync 3.2.7-1ubuntu1 to 3.2.7-1ubuntu1.1 The problem can be found, at least in a btrfs filesystem, as follows: $ mkdir D1 D2 $ echo test > D1/test $ rsync -av -H D1 D2 sending incremental file list Internal hashtable error: illegal key supplied! rsync erro

[Bug 2093177] [NEW] Multiple freezes and session crashes with nouveau drivers

2025-01-07 Thread Emmanuel DA MOTA
Public bug reported: Multiple display freezes and/or gnome session crashes since upgrade to 24.10 seems related to nouveau driver 2025-01-07T09:11:14.611749+01:00 pc1 kernel: nouveau :01:00.0: fifo: fault 00 [READ] at 00140785b000 engine 00 [GR] client 02 [GPC0/PE_0] reason 00 [PDE] on

[Bug 2043857] Re: UBUNTU 23.10 Iconos en el escritorio enlaces rotos

2024-12-22 Thread Jose Rogerio da Silva Bernardes
Tengo el mismo problema. Acabo de hacer una instalacion limpia de Ubuntu 24.10 LTS y de la nada las carpetas de (Documentos, Videos, Escritorio, Publico) tienen el enlace roto y estan en el escritorio. Es muy preocupante una INESTABILIDAD asi, lo que me hace plantear abandonar Ubuntu, ya que puedo

[Bug 2043857] Re: UBUNTU 23.10 Iconos en el escritorio enlaces rotos

2024-12-22 Thread Jose Rogerio da Silva Bernardes
Estas son capturas de mi pantallas con las incidencias. ** Attachment added: "Captura desde 2024-12-22 10-05-20.png" https://bugs.launchpad.net/ubuntu/+bug/2043857/+attachment/5846852/+files/Captura%20desde%202024-12-22%2010-05-20.png -- You received this bug notification because you are a m

[Bug 2086772] [NEW] package cups-daemon 2.4.7-1.2ubuntu7.2 failed to install/upgrade: unable to make backup link of './usr/lib/cups/backend/ipp' before installing new version: Input/output error

2024-11-06 Thread Lucas Henrique Lins da Silva
Public bug reported: i don't know much about the details, only thing i can say is that i recently started using ubuntu by dual booting with windows, i'm still a beginner at that, the installation process was also not fully complete due to some issues with something called Yaru, but i don't know if

[Bug 2076943] Re: Incorrect GPG signature file during autoinstall when using custom GPG key

2024-10-03 Thread Tiago Pasqualini da Silva
** Merge proposal linked: https://code.launchpad.net/~tiago.pasqualini/curtin/+git/curtin/+merge/474394 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2076943 Title: Incorrect GPG signature file d

[Bug 2076943] Re: Incorrect GPG signature file during autoinstall when using custom GPG key

2024-09-23 Thread Tiago Pasqualini da Silva
** Merge proposal linked: https://code.launchpad.net/~tiago.pasqualini/curtin/+git/curtin/+merge/473681 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2076943 Title: Incorrect GPG signature file d

[Bug 2033963] Re: New upstream bugfix release 3.0.18

2024-09-21 Thread Luís Infante da Câmara
** Changed in: vlc (Ubuntu) Assignee: Luís Infante da Câmara (luis220413) => (unassigned) ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. ht

[Bug 1983568] Re: FTBFS on armhf in Kinetic

2024-09-21 Thread Luís Infante da Câmara
This is now fixed, but it now fails to build in Oracular on all architectures due to two new issues. ** Changed in: xen (Ubuntu) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.lau

[Bug 1094888] Re: GIMP: Could not mount Canon Digital Camera

2024-09-21 Thread Luís Infante da Câmara
** Package changed: gimp (Ubuntu) => libgphoto2 (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1094888 Title: GIMP: Could not mount Canon Digital Camera To manage notifications about this b

[Bug 1971001] Re: Multiple vulnerabilities in Xenial, Bionic, Focal and Jammy

2024-09-21 Thread Luís Infante da Câmara
All of these CVEs are now fixed in all of these releases, including Trusty, that is now end-of-life. ** Summary changed: - Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal and Jammy + Multiple vulnerabilities in Xenial, Bionic, Focal and Jammy ** Description changed: - The versions in

[Bug 1971107] Re: Versions in Focal and Jammy are vulnerable to CVE-2022-26661 and CVE-2022-26662

2024-09-21 Thread Luís Infante da Câmara
** Changed in: tryton-proteus (Ubuntu) Status: In Progress => Confirmed ** Changed in: tryton-server (Ubuntu) Status: In Progress => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bu

[Bug 1971056] Re: CVE-2021-3850

2024-09-21 Thread Luís Infante da Câmara
** Changed in: libphp-adodb (Ubuntu) Status: In Progress => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1971056 Title: CVE-2021-3850 To manage notifications about this bug go to:

[Bug 1982554] Re: Fails to build due to compilation without -fPIC or PIC linking only on amd64

2024-09-21 Thread Luís Infante da Câmara
** Changed in: haskell-call-stack (Ubuntu) Status: Fix Committed => Fix Released ** Changed in: haskell-diff (Ubuntu) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.lau

[Bug 1970961] Re: Version in Bionic has multiple vulnerabilities

2024-09-21 Thread Luís Infante da Câmara
All priority-Medium CVEs in Bionic are now fixed. (There are no CVEs in this package in Bionic with High or Critical priority.) ** Changed in: faad2 (Ubuntu) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribe

[Bug 2033985] Re: Multiple vulnerabilities in Ubuntu 20.04 and 22.04

2024-09-21 Thread Luís Infante da Câmara
This is now fixed in Ubuntu 20.04 in the security pocket, in Ubuntu 22.04 through Ubuntu Pro, and in the development release. ** Changed in: jqueryui (Ubuntu) Status: Confirmed => Fix Released ** Information type changed from Private Security to Public Security -- You received this bug n

[Bug 1983018] Re: Backport to Ubuntu 18.04 (and in some cases 20.04)

2024-09-21 Thread Luís Infante da Câmara
Ubuntu 18.04 is now in ESM. ** Changed in: node-deepmerge (Ubuntu) Status: In Progress => Invalid ** Changed in: node-rollup (Ubuntu) Status: In Progress => Invalid ** Summary changed: - Backport to Ubuntu 18.04 (and in some cases 20.04) + Backport to Ubuntu 20.04 ** No longer af

[Bug 1970961] Re: Version in Bionic has multiple vulnerabilities

2024-09-21 Thread Luís Infante da Câmara
** Changed in: faad2 (Ubuntu) Status: In Progress => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970961 Title: Version in Bionic has multiple vulnerabilities To manage notificat

[Bug 1971004] Re: CVE-2022-23614

2024-09-21 Thread Luís Infante da Câmara
** Changed in: php-twig (Ubuntu) Status: In Progress => Confirmed ** Changed in: twig (Ubuntu) Status: In Progress => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1971004 Tit

[Bug 1987336] Re: Multiple vulnerabilities in Focal and Jammy

2024-09-21 Thread Luís Infante da Câmara
** Changed in: qt6-base (Ubuntu) Assignee: Luís Infante da Câmara (luis220413) => (unassigned) ** Changed in: qtbase-opensource-src (Ubuntu) Assignee: Luís Infante da Câmara (luis220413) => (unassigned) -- You received this bug notification because you are a member of Ubunt

[Bug 1970637] Re: ffmpeg depends on libmfx-gen1.2 on Alder Lake for Intel QSV support

2024-09-21 Thread Luís Infante da Câmara
** Changed in: intel-mediasdk (Ubuntu) Assignee: Luís Infante da Câmara (luis220413) => (unassigned) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970637 Title: ffmpeg depends on lib

[Bug 2081584] Re: Network Manager OpenConnect on Ubuntu 22.04 fails to conect to Palo Alto GlobalProtect VPN

2024-09-21 Thread Luís Infante da Câmara
*** This bug is a duplicate of bug 1969734 *** https://bugs.launchpad.net/bugs/1969734 ** This bug has been marked a duplicate of bug 1969734 [Jammy] NetworkManager-openconnect 1.2.6 not compatible with openconnect 8.20 -- You received this bug notification because you are a member of Ubu

[Bug 2076943] Re: Incorrect GPG signature file during autoinstall when using custom GPG key

2024-09-18 Thread Tiago Pasqualini da Silva
It is currently possible to achieve this by using templates, which is supported by curtin. This is currently not documented anywhere besides one of the examples: https://github.com/canonical/curtin/blob/master/examples/apt- source.yaml#L109 I have proposed a PR that adds documentation for this in

[Bug 1965988] Re: systemd-logind failed to idle channel 2 - kernel panic

2024-09-09 Thread Simony Santos da Costa
I have a DELL Inspiron-15-3511 and the same problem. I followed the blacklisting nouveau and worked. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1965988 Title: systemd-logind failed to idle channe

[Bug 2078374] [NEW] I tried to upgrade ubuntu then i got this error

2024-08-29 Thread Fernando da Silva Santos Villela
Public bug reported: Fail to upgrade to Ubuntu 24.04 ProblemType: Bug DistroRelease: Ubuntu 22.04 Package: ubuntu-release-upgrader-core 1:22.04.19 ProcVersionSignature: Ubuntu 5.15.0-119.129-generic 5.15.160 Uname: Linux 5.15.0-119-generic x86_64 NonfreeKernelModules: nvidia_modeset nvidia Apport

[Bug 2073580] [NEW] bug de vizualizacíon ubuntu

2024-07-19 Thread Jullien Da Rocha
Public bug reported: Hola Ubuntu, Posiblemente una problema en network-manager-openvpn-gnome. Despues de una upgrade a Ubuntu 24.10 hay un bug de vizualizacíon. La imagen es en archivo adjunto. Gracias ProblemType: Bug DistroRelease: Ubuntu 24.04 Package: network-manager-openvpn-gnome 1.10.2-4bu

[Bug 2072936] Re: Python3.12 SyntaxWarning

2024-07-14 Thread Jullien Da Rocha
** Changed in: terminator (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2072936 Title: Python3.12 SyntaxWarning To manage notifications about this bug go to:

[Bug 2072936] [NEW] Python3.12 SyntaxWarning

2024-07-12 Thread Jullien Da Rocha
Public bug reported: Puedo usar el terminator que funciona sin erros? ProblemType: Bug DistroRelease: Ubuntu 24.04 Package: terminator 2.1.3-1 ProcVersionSignature: Ubuntu 6.8.0-38.38-generic 6.8.8 Uname: Linux 6.8.0-38-generic x86_64 ApportVersion: 2.28.1-0ubuntu3 Architecture: amd64 CasperMD5Ch

[Bug 2065946] Re: UBSAN: array-index-out-of-bounds in /build/linux-hwe-6.5-ZV1Qen/linux-hwe-6.5-6.5.0

2024-05-18 Thread Luiz Carlos da Silveira Júnior
** Description changed: - This error occurred on my PC when booting Ubuntu from 22.04 in any + This error occurred on my PC when booting Ubuntu from 22.04/24.04 in any flavor, in Zorin and also with Pop!_OS 22.04. Looks like a new kernel issue. It seems to me that it has to do with Kernel

[Bug 2065946] [NEW] UBSAN: array-index-out-of-bounds in /build/linux-hwe-6.5-ZV1Qen/linux-hwe-6.5-6.5.0

2024-05-16 Thread Luiz Carlos da Silveira Júnior
Public bug reported: This error occurred on my PC when booting Ubuntu from 22.04 in any flavor, in Zorin and also with Pop!_OS 22.04. Looks like a new kernel issue. It seems to me that it has to do with Kernel 6.5, 6.8 +. Should I be worried about this? The problem does not occur in Fedora 39 o

[Bug 2065921] [NEW] Dualscreen fails since noble

2024-05-16 Thread Emmanuel DA MOTA
Public bug reported: Upgrade from 23.10 to 24.04 Now, dualscreen layout is wrong, the desktop's size is twice as it should be Also, text labels are hidden, i have to mouse over to show them ProblemType: Bug DistroRelease: Ubuntu 24.04 Package: xorg 1:7.7+23ubuntu3 ProcVersionSignature: Ubuntu 6.8

[Bug 2064289] [NEW] Requesting x86_64/AMD 64 vectorscan package

2024-04-30 Thread da-667
Public bug reported: Greetings! Recently, I was trying to build Cisco's Snort 3 on Ubuntu 24.04. Snort 3 can be compiled with support for hyperscan to enable better PCRE performance for network detection. In the past, using the libhyperscan- dev package worked fine. But now, it doesn't seem to wa

[Bug 1922654] Re: Apache Maven Multiple Security Bypass Vulnerabilities

2023-09-18 Thread Luís Infante da Câmara
** Patch added: "maven_focal.debdiff" https://bugs.launchpad.net/ubuntu/+source/maven/+bug/1922654/+attachment/5701761/+files/maven_focal.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bu

[Bug 1922654] Re: Apache Maven Multiple Security Bypass Vulnerabilities

2023-09-13 Thread Luís Infante da Câmara
** Also affects: maven-resolver (Ubuntu) Importance: Undecided Status: New ** Patch added: "maven-resolver_focal.debdiff" https://bugs.launchpad.net/ubuntu/+source/maven-resolver/+bug/1922654/+attachment/5700653/+files/maven-resolver_focal.debdiff -- You received this bug notificat

[Bug 1922654] Re: Apache Maven Multiple Security Bypass Vulnerabilities

2023-09-13 Thread Luís Infante da Câmara
** Patch added: "maven-resolver_jammy.debdiff" https://bugs.launchpad.net/ubuntu/+source/maven-resolver/+bug/1922654/+attachment/5700654/+files/maven-resolver_jammy.debdiff ** Changed in: maven-resolver (Ubuntu) Status: New => Fix Released -- You received this bug notification because

[Bug 1922654] Re: Apache Maven Multiple Security Bypass Vulnerabilities

2023-09-03 Thread Luís Infante da Câmara
** Changed in: maven (Ubuntu) Assignee: Luís Infante da Câmara (luis220413) => (unassigned) ** Patch added: "maven_jammy.debdiff" https://bugs.launchpad.net/ubuntu/+source/maven/+bug/1922654/+attachment/5697382/+files/maven_jammy.debdiff -- You received this bug notific

[Bug 1922654] Re: Apache Maven Multiple Security Bypass Vulnerabilities

2023-09-03 Thread Luís Infante da Câmara
** Patch added: "maven_focal.debdiff" https://bugs.launchpad.net/ubuntu/+source/maven/+bug/1922654/+attachment/5697379/+files/maven_focal.debdiff ** Changed in: maven (Ubuntu) Assignee: (unassigned) => Luís Infante da Câmara (luis220413) -- You received this bug notific

[Bug 1970779] Re: Upgrade to 2.36.7 for Focal and Jammy

2022-12-25 Thread Luís Infante da Câmara
** Changed in: wpewebkit (Ubuntu) Assignee: Luís Infante da Câmara (luis220413) => (unassigned) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1970779 Title: Upgrade to 2.36.7 for Fo

[Bug 1970779] Re: Upgrade to 2.36.7 for Focal and Jammy

2022-08-28 Thread Luís Cunha dos Reis Infante da Câmara
** Summary changed: - Upgrade to 2.36.6 for Focal and Jammy + Upgrade to 2.36.7 for Focal and Jammy ** Description changed: - I want to upgrade the versions in Focal and Jammy to 2.36.6 to fix + I want to upgrade the versions in Focal and Jammy to 2.36.7 to fix security issues and other bugs,

[Bug 1970779] Re: Upgrade to 2.36.6 for Focal and Jammy

2022-08-17 Thread Luís Cunha dos Reis Infante da Câmara
Test plan: 1. Add my PPA (https://launchpad.net/~luis220413/+archive/ubuntu/security-updates/) to a test system running Ubuntu 20.04 or 22.04 (both releases must be tested). 2. Install cog with "sudo apt install cog" 3. Run cog -P x11 https://ubuntu.com/ 4. Run cog -P headless https://ubuntu.com

[Bug 1970779] Re: Upgrade to 2.36.6 for Focal and Jammy

2022-08-14 Thread Luís Cunha dos Reis Infante da Câmara
There are 3 snaps that contain WPE WebKit: * https://snapcraft.io/wpe-webkit-mir-kiosk-with-delay * https://snapcraft.io/wpe-webkit-mir-kiosk * https://snapcraft.io/wpe-webkit-libs ** Changed in: wpewebkit (Ubuntu Focal) Status: New => Confirmed ** Changed in: wpewebkit (Ubuntu Jammy)

[Bug 1970779] Re: Upgrade to 2.36.6 for Focal and Jammy

2022-08-14 Thread Luís Cunha dos Reis Infante da Câmara
: wpewebkit (Ubuntu) Status: Fix Committed => In Progress ** Changed in: wpewebkit (Ubuntu) Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara (luis220413) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to t

[Bug 1970779] Re: Upgrade to 2.36.4 for Focal and Jammy

2022-08-07 Thread Luís Cunha dos Reis Infante da Câmara
WPE WebKit 2.36.6 was released today and I will package it next week (August 8-14). ** Summary changed: - Upgrade to 2.36.4 for Focal and Jammy + Upgrade to 2.36.6 for Focal and Jammy ** Description changed: - I want to upgrade the versions in Focal and Jammy to 2.36.4 to fix + [To be updated o

[Bug 1970779] Re: Upgrade to 2.36.4 for Focal and Jammy

2022-07-14 Thread Luís Cunha dos Reis Infante da Câmara
As I mentioned in the #ubuntu-security channel, to guarantee that we are not introducing issues, in addition to testing the package, only consider the changes in the Debian packaging tarball (ignoring the upstream changes). -- You received this bug notification because you are a member of Ubuntu

[Bug 1970779] Re: Upgrade to 2.36.4 for Focal and Jammy

2022-07-14 Thread Luís Cunha dos Reis Infante da Câmara
The patched source packages build successfully on all architectures. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1970779 Title: Upgrade to 2.36.4 for Focal and Jammy To manage notificatio

[Bug 1970779] Re: Upgrade to 2.36.4 for Focal and Jammy

2022-07-13 Thread Luís Cunha dos Reis Infante da Câmara
Impish will reach end-of-life tomorrow. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1970779 Title: Upgrade to 2.36.4 for Focal and Jammy To manage notifications about this bug go to: http

[Bug 1970779] Re: Upgrade to 2.36.4 for Focal, Impish and Jammy

2022-07-13 Thread Luís Cunha dos Reis Infante da Câmara
** Description changed: - I want to upgrade the versions in Focal, Impish and Jammy to 2.36.4 to - fix security issues and other bugs, as well as adding features that - increase compatibility with current websites. + I want to upgrade the versions in Focal and Jammy to 2.36.4 to fix + security iss

[Bug 1970779] Re: Upgrade to 2.36.4 for Focal, Impish and Jammy

2022-07-13 Thread Luís Cunha dos Reis Infante da Câmara
Given the first paragraph of comment #18, I just converted this bug back into a security update. ** Description changed: I want to upgrade the versions in Focal, Impish and Jammy to 2.36.4 to fix security issues and other bugs, as well as adding features that increase compatibility with cur

[Bug 1968922] Re: libnss3 is affected by CVE-2022-22747

2022-07-11 Thread Luís Cunha dos Reis Infante da Câmara
Fixed in versions 2:3.35-2ubuntu2.15 (18.04), 2:3.49.1-1ubuntu1.8 (20.04) and 2:3.68-1ubuntu1.2 (21.10). The version in Ubuntu 22.04 is not vulnerable. ** Changed in: nss (Ubuntu) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bu

[Bug 1970779] Re: Upgrade to 2.36.4 for Focal, Impish and Jammy

2022-07-05 Thread Luís Cunha dos Reis Infante da Câmara
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-22662 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-22677 ** Description changed: I want to upgrade the versions in Focal, Impish and Jammy to 2.36.4 to fix security issues and other bugs, as well as adding

[Bug 1970779] Re: Upgrade to 2.36.3 for Focal, Impish and Jammy

2022-07-05 Thread Luís Cunha dos Reis Infante da Câmara
Patched packages are building in my PPA: https://launchpad.net/~luis220413/+archive/ubuntu/security-updates. ** Summary changed: - Upgrade to 2.36.3 for Focal, Impish and Jammy + Upgrade to 2.36.4 for Focal, Impish and Jammy ** Description changed: - I want to upgrade the versions in Focal, Imp

[Bug 1970779] Re: Upgrade to 2.36.3 for Focal, Impish and Jammy

2022-07-05 Thread Luís Cunha dos Reis Infante da Câmara
Version 2.36.4 was released today. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1970779 Title: Upgrade to 2.36.3 for Focal, Impish and Jammy To manage notifications about this bug go to: h

[Bug 1970779] Re: Upgrade to 2.36.3 for Focal, Impish and Jammy

2022-06-29 Thread Luís Cunha dos Reis Infante da Câmara
The upstream project recommends updating the versions of WPE WebKit, especially when they include fixes for known security issues: https://lists.webkit.org/pipermail/webkit-wpe/2022-June/000522.html -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed

[Bug 1970779] Re: Upgrade to 2.36.3 for Focal, Impish and Jammy

2022-06-28 Thread Luís Cunha dos Reis Infante da Câmara
I have sent an email to the upstream mailing list (webkit-wpe) asking if anyone is using the WPE WebKit packages in Ubuntu in production: https://lists.webkit.org/pipermail/webkit-wpe/2022-June/000520.html -- You received this bug notification because you are a member of Ubuntu Bugs, which is sub

[Bug 1968922] Re: libnss3 is affected by CVE-2022-22747

2022-06-22 Thread Luís Cunha dos Reis Infante da Câmara
I requested to the security team that this CVE be fixed in Ubuntu and Marc Deslauriers (from the security team) replied: We rated this CVE priority to be "low", which means we will not fix it until more important security issues come up in NSS. -- You received this bug notification because you a

[Bug 1968922] Re: libnss3 is affected by CVE-2022-22747

2022-06-20 Thread Luís Cunha dos Reis Infante da Câmara
Version 2:3.49.1-1ubuntu1.7 was released after this bug was reported and does not contain a fix for this CVE. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1968922 Title: libnss3 is affected

[Bug 1970779] Re: Upgrade to 2.36.3 for Focal, Impish and Jammy

2022-06-17 Thread Luís Cunha dos Reis Infante da Câmara
We can use cog for testing that the CVEs are fixed, if necessary. Due to the exception in comment #18, I believe that this bug can go through the security sponsoring process. The snap https://snapcraft.io/wpe-webkit-mir-kiosk has been installed/used recently by a substantial number of users (accor

[Bug 1970779] Re: Upgrade to 2.36.3 for Focal, Impish and Jammy

2022-06-16 Thread Luís Cunha dos Reis Infante da Câmara
** Changed in: wpewebkit (Ubuntu) Assignee: Luís Cunha dos Reis Infante da Câmara (luis220413) => (unassigned) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1970779 Title: Upgrade

[Bug 1970779] Re: Upgrade to 2.36.3 for Focal, Impish and Jammy

2022-06-15 Thread Luís Cunha dos Reis Infante da Câmara
I have just transformed this bug into an Stable Release Update bug. ** Description changed: I want to upgrade the versions in Focal, Impish and Jammy to 2.36.3 to fix security issues and other bugs, as well as adding features that increase compatibility with current websites. The versi

[Bug 1970779] Re: Upgrade to 2.36.3 for Focal, Impish and Jammy

2022-06-15 Thread Luís Cunha dos Reis Infante da Câmara
** Description changed: + I want to upgrade the versions in Focal, Impish and Jammy to 2.36.3 to + fix security issues and other bugs, as well as adding features that + increase compatibility with current websites. + The version in Focal is affected by all vulnerabilities listed below. The

[Bug 1970779] Re: Multiple vulnerabilities in Focal, Impish and Jammy

2022-06-15 Thread Luís Cunha dos Reis Infante da Câmara
** Changed in: wpewebkit (Ubuntu) Status: Fix Committed => New ** Summary changed: - Multiple vulnerabilities in Focal, Impish and Jammy + Upgrade to 2.36.3 for Focal, Impish and Jammy -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to t

[Bug 1939281] Re: Please provide update for CVE-2021-36740 (VSV00007 Varnish HTTP/2 Request Smuggling Attack)

2022-06-08 Thread Luís Cunha dos Reis Infante da Câmara
** CVE removed: https://cve.mitre.org/cgi- bin/cvename.cgi?name=2019-20637 ** CVE removed: https://cve.mitre.org/cgi- bin/cvename.cgi?name=2020-11653 ** CVE removed: https://cve.mitre.org/cgi- bin/cvename.cgi?name=2022-23959 -- You received this bug notification because you are a member of Ubun

[Bug 1970507] Re: No security updates since release in all Ubuntu releases

2022-06-05 Thread Luís Cunha dos Reis Infante da Câmara
I am going through the last XSA (XSA-400) and will, if a local build is successful, add a patch for Focal tomorrow. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970507 Title: No security updates s

[Bug 1970507] Re: No security updates since release in all Ubuntu releases

2022-06-05 Thread Luís Cunha dos Reis Infante da Câmara
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-3639 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970507 Title: No security updates since release in all Ubuntu releases To manag

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-05 Thread Luís Cunha dos Reis Infante da Câmara
Complete log for all tests in 18.04. All .err files are either attached or in lena_test_errors.tar.xz. ** Attachment added: "ffmpeg_test_log" https://bugs.launchpad.net/ubuntu/+source/ffmpeg/+bug/1970674/+attachment/5594952/+files/ffmpeg_test_log -- You received this bug notification because

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-05 Thread Luís Cunha dos Reis Infante da Câmara
** Attachment added: "sub2video.err" https://bugs.launchpad.net/ubuntu/+source/ffmpeg/+bug/1970674/+attachment/5594951/+files/sub2video.err -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970674 Ti

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-05 Thread Luís Cunha dos Reis Infante da Câmara
Test force_key_frames is also failing on 18.04. TESTforce_key_frames --- /home/user/ffmpeg-3.4.11/tests/ref/fate/force_key_frames2022-05-14 00:07:14.0 +0100 +++ tests/data/fate/force_key_frames2022-06-04 22:55:25.002760714 +0100 @@ -1,4 +1,3 @@ -07567b9528b8de523faaf49e4e1e0fc

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-05 Thread Luís Cunha dos Reis Infante da Câmara
Test sub2video is taking 9 hours. Stack trace: (gdb) i s #0 0x7fff62bf5974 in clock_gettime () #1 0x7f88bdf30d06 in __GI___clock_gettime (clock_id=clock_id@entry=1, tp=tp@entry=0x7fff62bdeea0) at ../sysdeps/unix/clock_gettime.c:115 #2 0x7f88be7fa8d1 in av_gettime_relative () at src

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-04 Thread Luís Cunha dos Reis Infante da Câmara
The tests did not finish in 24 minutes and one test (sub2video) is taking 15 minutes. I will retest on 18.04 now and publish results tomorrow. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970674 Tit

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-04 Thread Luís Cunha dos Reis Infante da Câmara
The test failed on 18.04 due to an integrity issue when receiving the input file for the failed test. I will re-run the test suite now, but with the following commands (I only added the -k option to the last command): $ debuild -us -uc $ export LD_LIBRARY_PATH="libavcodec:libavdevice:libavfilter

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-04 Thread Luís Cunha dos Reis Infante da Câmara
Patch for typo in architecture name for Ubuntu 21.10 ** Patch added: "architecture_typo_impish.debdiff" https://bugs.launchpad.net/ubuntu/+source/ffmpeg/+bug/1970674/+attachment/5594797/+files/architecture_typo_impish.debdiff -- You received this bug notification because you are a member of

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-03 Thread Luís Cunha dos Reis Infante da Câmara
Running Lintian on the changes file for Ubuntu 22.04 (amd64) reports the following warnings: W: ffmpeg-dbgsym: elf-error In program headers: Unable to find program interpreter name [usr/lib/debug/.build-id/01/31a3a53a5037d9cfce0b08e65bdf645b5fc6a6.debug] W: ffmpeg-dbgsym: elf-error In program he

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-03 Thread Luís Cunha dos Reis Infante da Câmara
Patch for typo in architecture name for Ubuntu 22.04 ** Patch added: "architecture_typo_jammy.debdiff" https://bugs.launchpad.net/ubuntu/+source/ffmpeg/+bug/1970674/+attachment/5594759/+files/architecture_typo_jammy.debdiff -- You received this bug notification because you are a member of Ub

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-03 Thread Luís Cunha dos Reis Infante da Câmara
All tests from the upstream testsuite (FATE) pass on 22.04. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970674 Title: New bug fix releases 3.4.11, 4.2.7 and 4.4.2 To manage notifications about t

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-03 Thread Luís Cunha dos Reis Infante da Câmara
All tests from the upstream testsuite (FATE) pass on 21.10. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970674 Title: New bug fix releases 3.4.11, 4.2.7 and 4.4.2 To manage notifications about t

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-03 Thread Luís Cunha dos Reis Infante da Câmara
For the version in Ubuntu 21.10, Lintian reported a typo in an architecture name and that the upstream tarball is missing a signature. Please add the attached signature when uploading to the Ubuntu 21.10 and 22.04 archives. ** Attachment added: "ffmpeg-4.4.2.tar.xz.asc" https://bugs.launchpad

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-03 Thread Luís Cunha dos Reis Infante da Câmara
For 20.04, I have run the tests as follows (based on the same files as in 18.04, but of course in the source of 20.04): $ debuild -us -uc $ export LD_LIBRARY_PATH="libavcodec:libavdevice:libavfilter:libavformat:libavresample:libavutil:libpostproc:libswresample:libswscale" $ cd debian/standard $ m

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-03 Thread Luís Cunha dos Reis Infante da Câmara
For the version in Ubuntu 20.04, Lintian only reported that the upstream tarball is missing a signature. Please add the attached signature when uploading to the Ubuntu 20.04 archive. ** Attachment added: "ffmpeg-4.2.7.tar.xz.asc" https://bugs.launchpad.net/ubuntu/+source/ffmpeg/+bug/1970674/+

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-03 Thread Luís Cunha dos Reis Infante da Câmara
All tests from the upstream testsuite (FATE) pass on 20.04. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970674 Title: New bug fix releases 3.4.11, 4.2.7 and 4.4.2 To manage notifications about t

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-03 Thread Luís Cunha dos Reis Infante da Câmara
I have run the tests as follows (based on the instructions in doc/fate.texi): $ export LD_LIBRARY_PATH="libavcodec:libavdevice:libavfilter:libavformat:libavresample:libavutil:libpostproc:libswresample:libswscale" $ cd debian/standard $ make -j1 fate-rsync SAMPLES=fate-suite/ $ make -j1 fate SAMPLE

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-03 Thread Luís Cunha dos Reis Infante da Câmara
Test vsynth_lena-amv is failing in 18.04: the expected and actual input file hashes are different. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970674 Title: New bug fix releases 3.4.11, 4.2.7 and

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-03 Thread Luís Cunha dos Reis Infante da Câmara
Lintian only reported that the upstream tarball is missing a signature. Please add the attached signature when uploading to the Ubuntu 18.04 archive. ** Attachment added: "ffmpeg-3.4.11.tar.xz.asc" https://bugs.launchpad.net/ubuntu/+source/ffmpeg/+bug/1970674/+attachment/5594576/+files/ffmpeg

[Bug 1971056] Re: CVE-2021-3850

2022-06-02 Thread Luís Cunha dos Reis Infante da Câmara
** Changed in: libphp-adodb (Ubuntu) Status: New => In Progress ** Changed in: libphp-adodb (Ubuntu) Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara (luis220413) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscri

[Bug 1971004] Re: CVE-2022-23614

2022-06-02 Thread Luís Cunha dos Reis Infante da Câmara
** Changed in: php-twig (Ubuntu) Status: New => In Progress ** Changed in: twig (Ubuntu) Status: New => In Progress ** Changed in: php-twig (Ubuntu) Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara (luis220413) ** Changed in: twig (Ubuntu)

[Bug 1971107] Re: Versions in Focal, Impish and Jammy are vulnerable to CVE-2022-26661 and CVE-2022-26662

2022-06-01 Thread Luís Cunha dos Reis Infante da Câmara
** Changed in: tryton-proteus (Ubuntu) Status: Confirmed => In Progress ** Changed in: tryton-server (Ubuntu) Status: Confirmed => In Progress ** Changed in: tryton-proteus (Ubuntu) Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara (luis220413) ** C

[Bug 1970961] Re: Version in Bionic has multiple vulnerabilities

2022-06-01 Thread Luís Cunha dos Reis Infante da Câmara
** Changed in: faad2 (Ubuntu) Status: New => In Progress ** Changed in: faad2 (Ubuntu) Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara (luis220413) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1970507] Re: No security updates since release in all Ubuntu releases

2022-06-01 Thread Luís Cunha dos Reis Infante da Câmara
** CVE removed: https://cve.mitre.org/cgi- bin/cvename.cgi?name=2021-26934 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970507 Title: No security updates since release in all Ubuntu releases To m

[Bug 1970783] Re: Multiple vulnerabilities in Bionic

2022-06-01 Thread Luís Cunha dos Reis Infante da Câmara
ged in: webkit2gtk (Ubuntu) Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara (luis220413) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970783 Title: Multiple vulnerabilit

[Bug 1971185] Re: Multiple vulnerabilities in Bionic, Focal, Impish and Jammy

2022-05-31 Thread Luís Cunha dos Reis Infante da Câmara
** Patch added: "spip_jammy.debdiff" https://bugs.launchpad.net/ubuntu/+source/spip/+bug/1971185/+attachment/5594136/+files/spip_jammy.debdiff ** Changed in: spip (Ubuntu) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bug

[Bug 1971185] Re: Multiple vulnerabilities in Bionic, Focal, Impish and Jammy

2022-05-31 Thread Luís Cunha dos Reis Infante da Câmara
** Patch added: "spip_impish.debdiff" https://bugs.launchpad.net/ubuntu/+source/spip/+bug/1971185/+attachment/5594134/+files/spip_impish.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/197118

[Bug 1971185] Re: Multiple vulnerabilities in Bionic, Focal, Impish and Jammy

2022-05-31 Thread Luís Cunha dos Reis Infante da Câmara
** Patch added: "spip_focal.debdiff" https://bugs.launchpad.net/ubuntu/+source/spip/+bug/1971185/+attachment/5594133/+files/spip_focal.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1971185

[Bug 1971185] Re: Multiple vulnerabilities in Bionic, Focal, Impish and Jammy

2022-05-31 Thread Luís Cunha dos Reis Infante da Câmara
ntu) Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara (luis220413) ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-28959 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-28960 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-28961 -

  1   2   3   4   5   6   7   8   9   10   >