ChangeLog Stops full update on 12:10 Ubuntu

Bug #1137946 reported by Gordon McIntosh
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
apt (Ubuntu)
New
Undecided
Unassigned
apt-listchanges (Ubuntu)
New
Undecided
Unassigned

Bug Description

When installing updates / upgrades via software update system changelog comes up and stops any other actions occuring - need to Ctrl-C to exit window - program finishes on END.

This occurs with synaptic and from apt-get

installArchives() failed: Reading changelogs... 3%%
Reading changelogs... 6%%
Reading changelogs... 9%%
Reading changelogs... 12%%
Reading changelogs... 15%%
Reading changelogs... 18%%
Reading changelogs... 21%%
Reading changelogs... 25%%
Reading changelogs... 28%%
Reading changelogs... 31%%
Reading changelogs... 34%%
Reading changelogs... 37%%
Reading changelogs... 40%%
Reading changelogs... 43%%
Reading changelogs... 46%%
Reading changelogs... 50%%
Reading changelogs... 53%%
Reading changelogs... 56%%
Reading changelogs... 59%%
E: changelog for this version is not (yet) available; try https://launchpad.net/ubuntu/+source/adobe-flashplugin/+changelog
Reading changelogs... 62%%
E: changelog for this version is not (yet) available; try https://launchpad.net/ubuntu/+source/adobe-flashplugin/+changelog
Reading changelogs... 65%%
Reading changelogs... 68%%
Reading changelogs... 71%%
Reading changelogs... 75%%
Reading changelogs... 78%%
Reading changelogs... 81%%
Reading changelogs... 84%%
Reading changelogs... 87%%
Reading changelogs... 90%%
Reading changelogs... 93%%
Reading changelogs... 96%%
Reading changelogs... 100%%

Reading changelogs... Done

Get:1 Changelog for libdbus-glib-1-2 (http://changelogs.ubuntu.com/changelogs/po ol/main/d/dbus-glib/dbus-glib_0.100-1ubuntu0.1/changelog) [44.0 kB]
dbus-glib (0.100-1ubuntu0.1) quantal-security; urgency=low

  * SECURITY UPDATE: possible privilege escalation via source spoofing
    - debian/patches/CVE-2013-0292.patch: verify sender of NameOwnerChanged
      signals in dbus/dbus-gproxy.c.
    - CVE-2013-0292

 -- Marc Deslauriers <email address hidden> Fri, 22 Feb 2013 15:33:44 -0 500

Get:1 Changelog for libgnutls26 (http://changelogs.ubuntu.com/changelogs/pool/ma in/g/gnutls26/gnutls26_2.12.14-5ubuntu4.2/changelog) [55.3 kB]
gnutls26 (2.12.14-5ubuntu4.2) quantal-security; urgency=low

  * SECURITY UPDATE: "Lucky Thirteen" timing side-channel TLS attack
    - debian/patches/CVE-2013-1619.patch: avoid timing attacks in
      lib/gnutls_cipher.c, lib/gnutls_hash_int.h.
    - CVE-2013-1619

 -- Marc Deslauriers <email address hidden> Mon, 25 Feb 2013 11:31:46 -0 500
/tmp/tmpa577Ac
:
Get:1 Changelog for linux-image-3.5.0-25-generic (http://changelogs.ubuntu.com/c :
hangelogs/pool/main/l/linux/linux_3.5.0-25.39/changelog) [377 kB]
:
linux (3.5.0-25.39) quantal-proposed; urgency=low
:
:
  [Brad Figg]
:
:
  * Release Tracking Bug
:
    - LP: #1132885
:
:
  [ Upstream Kernel Changes ]
:
:
  * sock_diag: Fix out-of-bounds access to sock_diag_handlers[]
:
:
 -- Brad Figg <email address hidden> Mon, 25 Feb 2013 09:04:12 -0800
:
:
Get:1 Changelog for openjdk-7-jre-headless (http://changelogs.ubuntu.com/changel :
ogs/pool/main/o/openjdk-7/openjdk-7_7u15-2.3.7-0ubuntu1~12.10/changelog) [117 kB :
]
:
openjdk-7 (7u15-2.3.7-0ubuntu1~12.10) quantal-security; urgency=low
:
:
  * Build for quantal.
:
:
 -- Matthias Klose <email address hidden> Thu, 21 Feb 2013 00:14:41 +0100
:
:
openjdk-7 (7u15-2.3.7-1) experimental; urgency=low
:
:
  * IcedTea7 2.3.7 release.
:
  * Security fixes:
:
    - S8004937, CVE-2013-1484: Improve proxy construction.
:
    - S8006439, CVE-2013-1485: Improve MethodHandles coverage.
:
    - S8006446, CVE-2013-1486: Restrict MBeanServer access.
:
    - S8006777, CVE-2013-0169: Improve TLS handling of invalid messages.
:
    - S8007688: Blacklist known bad certificate.
:
  * Backports:
:
    - S8007393: Possible race condition after JDK-6664509.
:
    - S8007611: logging behavior in applet changed.
:
  * For zero builds, use the same hotspot version as in 2.1.6.
:
  * Reenable bootstrap builds, except for alpha.
:
  * Explicitly disable building on mips/mipsel. Not supported by the
:
    Debian OpenJDK maintainers, the Debian mips porters, or the Debian
:
    Java team.
:
:
 -- Matthias Klose <email address hidden> Wed, 20 Feb 2013 23:33:58 +0100
:
:
openjdk-7 (7u13-2.3.6-1) experimental; urgency=low
:
:
  * IcedTea7 2.3.6 release.
:
    - Disable bootstrap builds, currently broken in IcedTea.
:
  * Security fixes:
:
    - S6563318, CVE-2013-0424: RMI data sanitization.
:
    - S6664509, CVE-2013-0425: Add logging context.
:
    - S6664528, CVE-2013-0426: Find log level matching its name or value given
:
      at construction time.
:
    - S6776941: CVE-2013-0427: Improve thread pool shutdown.
:
    - S7141694, CVE-2013-0429: Improving CORBA internals.
:
    - S7173145: Improve in-memory representation of splashscreens.
:
    - S7186945: Unpack200 improvement.
:
    - S7186946: Refine unpacker resource usage.
:
    - S7186948: Improve Swing data validation.
:
    - S7186952, CVE-2013-0432: Improve clipboard access.
:
    - S7186954: Improve connection performance.
:
    - S7186957: Improve Pack200 data validation.
:
    - S7192392, CVE-2013-0443: Better validation of client keys.
:
    - S7192393, CVE-2013-0440: Better Checking of order of TLS Messages.
:
    - S7192977, CVE-2013-0442: Issue in toolkit thread.
:
    - S7197546, CVE-2013-0428: (proxy) Reflect about creating reflective proxies :
.
:
    - S7200491: Tighten up JTable layout code.
:
    - S7200500: Launcher better input validation.
:
    - S7201064: Better dialogue checking.
:
    - S7201066, CVE-2013-0441: Change modifiers on unused fields.
:
    - S7201068, CVE-2013-0435: Better handling of UI elements.
:
    - S7201070: Serialization to conform to protocol.
:
    - S7201071, CVE-2013-0433: InetSocketAddress serialization issue.
:
    - S8000210: Improve JarFile code quality.
:
    - S8000537, CVE-2013-0450: Contextualize RequiredModelMBean class.
:
    - S8000540, CVE-2013-1475: Improve IIOP type reuse management.
:
    - S8000631, CVE-2013-1476: Restrict access to class constructor.
:
    - S8001235, CVE-2013-0434: Improve JAXP HTTP handling.
:
    - S8001242: Improve RMI HTTP conformance.
:
    - S8001307: Modify ACC_SUPER behavior.
:
    - S8001972, CVE-2013-1478: Improve image processing.
:
    - S8002325, CVE-2013-1480: Improve management of images.
:
  * Fix font suggestion for indic fonts in wheezy.
:
  * Fix fontconfig definitions for japanese and korean fonts, fixing
:
    compilation of the fontconfig file.
:
  * Add Built-Using: rhino attribute for the -lib package.
:
  * Don't use concurrent features to rewrite the rhino jar file.
:
  * Enable class data sharing for the hotspot server VM.
:
:
 -- Matthias Klose <email address hidden> Tue, 12 Feb 2013 20:59:48 +0100
:
:
Get:1 Changelog for libssl-doc (http://changelogs.ubuntu.com/changelogs/pool/mai :
n/o/openssl/openssl_1.0.1c-3ubuntu2.2/changelog) [102 kB]
:
openssl (1.0.1c-3ubuntu2.2) quantal-security; urgency=low
:
:
  * REGRESSION FIX: decryption errors on AES-NI hardware (LP: #1134873,
:
    LP: #1133333)
:
    - debian/patches/CVE-2013-0169.patch: disabled for now until fix is
:
      available from upstream.
:
:
 -- Marc Deslauriers <email address hidden> Thu, 28 Feb 2013 10:56:42 -0 :
500
:
:
openssl (1.0.1c-3ubuntu2.1) quantal-security; urgency=low
:
:
  * SECURITY UPDATE: denial of service via invalid OCSP key
:
    - debian/patches/CVE-2013-0166.patch: properly handle NULL key in
:
      crypto/asn1/a_verify.c, crypto/ocsp/ocsp_vfy.c.
:
    - CVE-2013-0166
:
  * SECURITY UPDATE: "Lucky Thirteen" timing side-channel TLS attack
:
    - debian/patches/CVE-2013-0169.patch: massive code changes
:
    - CVE-2013-0169
:
  * SECURITY UPDATE: denial of service via AES-NI and crafted CBC data
:
    - Fix included in CVE-2013-0169 patch
:
    - CVE-2012-2686
:
:
 -- Marc Deslauriers <email address hidden> Mon, 18 Feb 2013 13:13:42 -0 :
500
:
:
Get:1 Changelog for libruby1.9.1 (http://changelogs.ubuntu.com/changelogs/pool/m :
ain/r/ruby1.9.1/ruby1.9.1_1.9.3.194-1ubuntu1.3/changelog) [44.6 kB]
:
ruby1.9.1 (1.9.3.194-1ubuntu1.3) quantal-security; urgency=low
:
:
  * SECURITY UPDATE: denial of service via hash collisions
:
    - debian/patches/20121120-cve-2012-5371.diff: replace hash
:
      implementation in common.mk, random.c, siphash.*, string.c.
:
    - CVE-2012-5371
:
  * SECURITY UPDATE: xss in documents generated by rdoc
:
    - debian/patches/CVE-2013-0256.patch: fix xss in
:
      lib/rdoc/generator/template/darkfish/js/darkfish.js.
:
    - CVE-2013-0256
:
  * SECURITY UPDATE: DoS and unsafe object creation via JSON
:
    - debian/patches/CVE-2013-0269.patch: fix JSON parsing in
:
      ext/json/lib/json/add/core.rb, ext/json/lib/json/common.rb,
:
      ext/json/parser/parser.c, ext/json/parser/parser.rl,
:
      test/json/test_json.rb, test/json/test_json_addition.rb,
:
      test/json/test_json_string_matching.rb.
:
    - CVE-2013-0269
:
  * Patches taken from Debian 1.9.3.194-7 package.
:
:
 -- Marc Deslauriers <email address hidden> Fri, 15 Feb 2013 09:30:35 -0 :
500
:
:
Get:1 Changelog for sudo (http://changelogs.ubuntu.com/changelogs/pool/main/s/su :
do/sudo_1.8.5p2-1ubuntu1.1/changelog) [52.1 kB]
:
sudo (1.8.5p2-1ubuntu1.1) quantal-security; urgency=low
:
:
  * SECURITY UPDATE: authentication bypass via clock set to epoch
:
    - debian/patches/CVE-2013-1775.patch: ignore time stamp file if it is
:
      set to epoch in plugins/sudoers/check.c.
:
    - CVE-2013-1775
:
:
 -- Marc Deslauriers <email address hidden> Wed, 27 Feb 2013 13:31:24 -0 :
500
:
:
Get:1 Changelog for thunderbird (http://changelogs.ubuntu.com/changelogs/pool/ma :
in/t/thunderbird/thunderbird_17.0.3+build1-0ubuntu0.12.10.1/changelog) [283 kB]
:
thunderbird (17.0.3+build1-0ubuntu0.12.10.1) quantal-security; urgency=low
:
:
  * New upstream stable release (THUNDERBIRD_17_0_3_BUILD1)
:
    - see LP: #1131110 for USN information
:
:
 -- Chris Coulson <email address hidden> Thu, 21 Feb 2013 09:26:58 +0000
:
:
Get:1 Changelog for transmission-common (http://changelogs.ubuntu.com/changelogs :
/pool/main/t/transmission/transmission_2.61-0ubuntu2.2/changelog) [28.7 kB]
:
transmission (2.61-0ubuntu2.2) quantal-security; urgency=low
:
:
  * SECURITY UPDATE: denial of service and possible code execution in libutp
:
    - debian/patches/CVE-2012-6129.patch: properly calculate lengths in
:
      third-party/libutp/utp.cpp.
:
    - CVE-2012-6129
:
:
 -- Marc Deslauriers <email address hidden> Fri, 22 Feb 2013 08:27:17 -0 :
500
:

Tags: bot-comment
Revision history for this message
Ubuntu Foundations Team Bug Bot (crichton) wrote :

Thank you for taking the time to report this bug and helping to make Ubuntu better. It seems that your bug report is not filed about a specific source package though, rather it is just filed against Ubuntu in general. It is important that bug reports be filed about source packages so that people interested in the package can find the bugs about it. You can find some hints about determining what package your bug might be about at https://wiki.ubuntu.com/Bugs/FindRightPackage. You might also ask for help in the #ubuntu-bugs irc channel on Freenode.

To change the source package that this bug is filed about visit https://bugs.launchpad.net/ubuntu/+bug/1137946/+editstatus and add the package name in the text box next to the word Package.

[This is an automated message. I apologize if it reached you inappropriately; please just reply to this message indicating so.]

tags: added: bot-comment
affects: ubuntu → apt (Ubuntu)
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.