package clamav-base 0.99.3+addedllvm-0ubuntu0.14.04.1 failed to install/upgrade: subprocess installed post-installation script returned error exit status 128
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
clamav (Ubuntu) |
Expired
|
Undecided
|
Unassigned | ||
debconf (Ubuntu) |
Expired
|
Undecided
|
Unassigned |
Bug Description
My computer used to continually freeze after about thirty (30) seconds or so such that neither my mouse nor my keyboard worked because they froze, which required me to repeatedly restart my computer, but not first without disconnecting my computer from its internet connection, given that my understanding is and/or was that there are or were security problems in permitting the grub loader to be seen and, therefore, its key to be read by eavesdropper(s) on the other end of the internet cable. Nevertheless, it also appears, after having reviewed my computer's files and folder that criminal hacker(s) have and continue to attempt to infiltrate my computer by means of two (2) known files, Namely, .pki and .esd_auth . Given that my computer was hacked a day or two ago, thereby rendering it useless to the point of my computer being unable to boot, I assert and maintain that these vulnerabilities ought to be addressed to prevent further security breaches in an otherwise excellent operating system.
ProblemType: Package
DistroRelease: Ubuntu 14.04
Package: clamav-base 0.99.3+
ProcVersionSign
Uname: Linux 3.2.0-121-
ApportVersion: 2.14.1-0ubuntu3.27
Architecture: i386
Date: Wed Feb 7 20:46:24 2018
DuplicateSignature: package:
ErrorMessage: subprocess installed post-installation script returned error exit status 128
InstallationDate: Installed on 2017-02-16 (356 days ago)
InstallationMedia: Ubuntu 12.04 LTS "Precise Pangolin" - Release i386 (20120423)
PackageArchitec
ProcCmdline: BOOT_IMAGE=
RelatedPackageV
dpkg 1.17.5ubuntu5.7
apt 1.0.1ubuntu2.17
SourcePackage: clamav
Title: package clamav-base 0.99.3+
UpgradeStatus: Upgraded to trusty on 2017-07-29 (194 days ago)
tags: | removed: need-duplicate-check |
Changed in debconf (Ubuntu): | |
status: | New → Incomplete |
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find.