ChangeLog Stops full update on 12:10 Ubuntu
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
apt (Ubuntu) |
New
|
Undecided
|
Unassigned | ||
apt-listchanges (Ubuntu) |
New
|
Undecided
|
Unassigned |
Bug Description
When installing updates / upgrades via software update system changelog comes up and stops any other actions occuring - need to Ctrl-C to exit window - program finishes on END.
This occurs with synaptic and from apt-get
installArchives() failed: Reading changelogs... 3%%
Reading changelogs... 6%%
Reading changelogs... 9%%
Reading changelogs... 12%%
Reading changelogs... 15%%
Reading changelogs... 18%%
Reading changelogs... 21%%
Reading changelogs... 25%%
Reading changelogs... 28%%
Reading changelogs... 31%%
Reading changelogs... 34%%
Reading changelogs... 37%%
Reading changelogs... 40%%
Reading changelogs... 43%%
Reading changelogs... 46%%
Reading changelogs... 50%%
Reading changelogs... 53%%
Reading changelogs... 56%%
Reading changelogs... 59%%
E: changelog for this version is not (yet) available; try https:/
Reading changelogs... 62%%
E: changelog for this version is not (yet) available; try https:/
Reading changelogs... 65%%
Reading changelogs... 68%%
Reading changelogs... 71%%
Reading changelogs... 75%%
Reading changelogs... 78%%
Reading changelogs... 81%%
Reading changelogs... 84%%
Reading changelogs... 87%%
Reading changelogs... 90%%
Reading changelogs... 93%%
Reading changelogs... 96%%
Reading changelogs... 100%%
Reading changelogs... Done
Get:1 Changelog for libdbus-glib-1-2 (http://
dbus-glib (0.100-1ubuntu0.1) quantal-security; urgency=low
* SECURITY UPDATE: possible privilege escalation via source spoofing
- debian/
signals in dbus/dbus-gproxy.c.
- CVE-2013-0292
-- Marc Deslauriers <email address hidden> Fri, 22 Feb 2013 15:33:44 -0 500
Get:1 Changelog for libgnutls26 (http://
gnutls26 (2.12.14-
* SECURITY UPDATE: "Lucky Thirteen" timing side-channel TLS attack
- debian/
lib/
- CVE-2013-1619
-- Marc Deslauriers <email address hidden> Mon, 25 Feb 2013 11:31:46 -0 500
/tmp/tmpa577Ac
:
Get:1 Changelog for linux-image-
hangelogs/
:
linux (3.5.0-25.39) quantal-proposed; urgency=low
:
:
[Brad Figg]
:
:
* Release Tracking Bug
:
- LP: #1132885
:
:
[ Upstream Kernel Changes ]
:
:
* sock_diag: Fix out-of-bounds access to sock_diag_
:
:
-- Brad Figg <email address hidden> Mon, 25 Feb 2013 09:04:12 -0800
:
:
Get:1 Changelog for openjdk-
ogs/pool/
]
:
openjdk-7 (7u15-2.
:
:
* Build for quantal.
:
:
-- Matthias Klose <email address hidden> Thu, 21 Feb 2013 00:14:41 +0100
:
:
openjdk-7 (7u15-2.3.7-1) experimental; urgency=low
:
:
* IcedTea7 2.3.7 release.
:
* Security fixes:
:
- S8004937, CVE-2013-1484: Improve proxy construction.
:
- S8006439, CVE-2013-1485: Improve MethodHandles coverage.
:
- S8006446, CVE-2013-1486: Restrict MBeanServer access.
:
- S8006777, CVE-2013-0169: Improve TLS handling of invalid messages.
:
- S8007688: Blacklist known bad certificate.
:
* Backports:
:
- S8007393: Possible race condition after JDK-6664509.
:
- S8007611: logging behavior in applet changed.
:
* For zero builds, use the same hotspot version as in 2.1.6.
:
* Reenable bootstrap builds, except for alpha.
:
* Explicitly disable building on mips/mipsel. Not supported by the
:
Debian OpenJDK maintainers, the Debian mips porters, or the Debian
:
Java team.
:
:
-- Matthias Klose <email address hidden> Wed, 20 Feb 2013 23:33:58 +0100
:
:
openjdk-7 (7u13-2.3.6-1) experimental; urgency=low
:
:
* IcedTea7 2.3.6 release.
:
- Disable bootstrap builds, currently broken in IcedTea.
:
* Security fixes:
:
- S6563318, CVE-2013-0424: RMI data sanitization.
:
- S6664509, CVE-2013-0425: Add logging context.
:
- S6664528, CVE-2013-0426: Find log level matching its name or value given
:
at construction time.
:
- S6776941: CVE-2013-0427: Improve thread pool shutdown.
:
- S7141694, CVE-2013-0429: Improving CORBA internals.
:
- S7173145: Improve in-memory representation of splashscreens.
:
- S7186945: Unpack200 improvement.
:
- S7186946: Refine unpacker resource usage.
:
- S7186948: Improve Swing data validation.
:
- S7186952, CVE-2013-0432: Improve clipboard access.
:
- S7186954: Improve connection performance.
:
- S7186957: Improve Pack200 data validation.
:
- S7192392, CVE-2013-0443: Better validation of client keys.
:
- S7192393, CVE-2013-0440: Better Checking of order of TLS Messages.
:
- S7192977, CVE-2013-0442: Issue in toolkit thread.
:
- S7197546, CVE-2013-0428: (proxy) Reflect about creating reflective proxies :
.
:
- S7200491: Tighten up JTable layout code.
:
- S7200500: Launcher better input validation.
:
- S7201064: Better dialogue checking.
:
- S7201066, CVE-2013-0441: Change modifiers on unused fields.
:
- S7201068, CVE-2013-0435: Better handling of UI elements.
:
- S7201070: Serialization to conform to protocol.
:
- S7201071, CVE-2013-0433: InetSocketAddress serialization issue.
:
- S8000210: Improve JarFile code quality.
:
- S8000537, CVE-2013-0450: Contextualize RequiredModelMBean class.
:
- S8000540, CVE-2013-1475: Improve IIOP type reuse management.
:
- S8000631, CVE-2013-1476: Restrict access to class constructor.
:
- S8001235, CVE-2013-0434: Improve JAXP HTTP handling.
:
- S8001242: Improve RMI HTTP conformance.
:
- S8001307: Modify ACC_SUPER behavior.
:
- S8001972, CVE-2013-1478: Improve image processing.
:
- S8002325, CVE-2013-1480: Improve management of images.
:
* Fix font suggestion for indic fonts in wheezy.
:
* Fix fontconfig definitions for japanese and korean fonts, fixing
:
compilation of the fontconfig file.
:
* Add Built-Using: rhino attribute for the -lib package.
:
* Don't use concurrent features to rewrite the rhino jar file.
:
* Enable class data sharing for the hotspot server VM.
:
:
-- Matthias Klose <email address hidden> Tue, 12 Feb 2013 20:59:48 +0100
:
:
Get:1 Changelog for libssl-doc (http://
n/o/openssl/
:
openssl (1.0.1c-3ubuntu2.2) quantal-security; urgency=low
:
:
* REGRESSION FIX: decryption errors on AES-NI hardware (LP: #1134873,
:
LP: #1133333)
:
- debian/
:
available from upstream.
:
:
-- Marc Deslauriers <email address hidden> Thu, 28 Feb 2013 10:56:42 -0 :
500
:
:
openssl (1.0.1c-3ubuntu2.1) quantal-security; urgency=low
:
:
* SECURITY UPDATE: denial of service via invalid OCSP key
:
- debian/
:
crypto/
:
- CVE-2013-0166
:
* SECURITY UPDATE: "Lucky Thirteen" timing side-channel TLS attack
:
- debian/
:
- CVE-2013-0169
:
* SECURITY UPDATE: denial of service via AES-NI and crafted CBC data
:
- Fix included in CVE-2013-0169 patch
:
- CVE-2012-2686
:
:
-- Marc Deslauriers <email address hidden> Mon, 18 Feb 2013 13:13:42 -0 :
500
:
:
Get:1 Changelog for libruby1.9.1 (http://
ain/r/ruby1.
:
ruby1.9.1 (1.9.3.
:
:
* SECURITY UPDATE: denial of service via hash collisions
:
- debian/
:
implement
:
- CVE-2012-5371
:
* SECURITY UPDATE: xss in documents generated by rdoc
:
- debian/
:
lib/
:
- CVE-2013-0256
:
* SECURITY UPDATE: DoS and unsafe object creation via JSON
:
- debian/
:
ext/
:
ext/
:
test/
:
test/
:
- CVE-2013-0269
:
* Patches taken from Debian 1.9.3.194-7 package.
:
:
-- Marc Deslauriers <email address hidden> Fri, 15 Feb 2013 09:30:35 -0 :
500
:
:
Get:1 Changelog for sudo (http://
do/sudo_
:
sudo (1.8.5p2-
:
:
* SECURITY UPDATE: authentication bypass via clock set to epoch
:
- debian/
:
set to epoch in plugins/
:
- CVE-2013-1775
:
:
-- Marc Deslauriers <email address hidden> Wed, 27 Feb 2013 13:31:24 -0 :
500
:
:
Get:1 Changelog for thunderbird (http://
in/t/thunderbir
:
thunderbird (17.0.3+
:
:
* New upstream stable release (THUNDERBIRD_
:
- see LP: #1131110 for USN information
:
:
-- Chris Coulson <email address hidden> Thu, 21 Feb 2013 09:26:58 +0000
:
:
Get:1 Changelog for transmission-common (http://
/pool/main/
:
transmission (2.61-0ubuntu2.2) quantal-security; urgency=low
:
:
* SECURITY UPDATE: denial of service and possible code execution in libutp
:
- debian/
:
third-
:
- CVE-2012-6129
:
:
-- Marc Deslauriers <email address hidden> Fri, 22 Feb 2013 08:27:17 -0 :
500
:
affects: | ubuntu → apt (Ubuntu) |
Thank you for taking the time to report this bug and helping to make Ubuntu better. It seems that your bug report is not filed about a specific source package though, rather it is just filed against Ubuntu in general. It is important that bug reports be filed about source packages so that people interested in the package can find the bugs about it. You can find some hints about determining what package your bug might be about at https:/ /wiki.ubuntu. com/Bugs/ FindRightPackag e. You might also ask for help in the #ubuntu-bugs irc channel on Freenode.
To change the source package that this bug is filed about visit https:/ /bugs.launchpad .net/ubuntu/ +bug/1137946/ +editstatus and add the package name in the text box next to the word Package.
[This is an automated message. I apologize if it reached you inappropriately; please just reply to this message indicating so.]