KGB-2devhelp Mohammed Sadiq 358615 * commented merge request !2 * https://deb.li/i7ICj04:15
tjaaltonevince doesn't support png in kinetic?07:07
tjaaltonoops, tab-complete fail :P07:08
seb128goood morning desktopers!07:59
ricotzhello seb128 08:01
seb128tjaalton, hey, our image viewer is eog not evince, why would evince open a png?08:03
seb128ricotz, hey, how are you?08:03
ricotzseb128, I am good, thanks, how are you?08:04
seb128I'm alright, thanks!08:04
ricotzseb128, I am wondering if this can be fast tracked https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/199844408:04
-ubottu:#ubuntu-desktop- Launchpad bug 1998444 in tiff (Ubuntu Kinetic) "Backport security fix for CVE-2022-3970" [Critical, New]08:04
seb128ricotz, let me see if I can help nagging there08:05
ricotzseb128, <ebarretto>08:06
ricotzseb128, <ebarretto> answered in #ubuntu-security08:06
seb128ricotz, he's working on it?08:06
ricotz<ebarretto> thanks ricotz, some colleague will sponsor it, we will let you know through the ticket or here 08:06
ricotzno idea why this CVE was only handled on xenial :\ https://ubuntu.com/security/CVE-2022-397008:07
-ubottu:#ubuntu-desktop- A vulnerability was found in LibTIFF. It has been classified as critical. This affects the function TIFFReadRGBATileExt of the file libtiff/tif_getimage.c. The manipulation leads to integer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 227500897dfb07fb7d27f7aa570050e626... <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3970>08:07
ricotzstill puzzling why this libreoffice test failure didn't happen weeks ago when test building08:10
seb128yeah, I don't know08:14
oSoMoNgood morning desktoppers09:32
seb128oSoMoN, hey, how are you today?09:33
oSoMoNseb128, I'm fine, fully recovered from that stomach bug and the rest of the family too09:35
seb128nice to hear :)09:35
tjaaltonseb128: exactly09:57
tjaaltonmy mistake09:57
seb128tjaalton, so eog refuses to help png files for you?09:57
tjaaltonno, eog works09:58
seb128so you just got confused and that was a question to ignore? :)09:58
tjaaltonI googled it, and saw someone else did the same mistake, heh09:58
juliankoh, gnome-shell dumps core and I don't have apport installed because I'm developing  stuff so need to use systemd-coredump12:26
juliank#0  0x00007f0c3e148252 in ?? () from /usr/lib/x86_64-linux-gnu/mutter-11/libmutter-clutter-11.so.012:27
juliank#1  0x00007f0c3e175579 in _clutter_process_event () from /usr/lib/x86_64-linux-gnu/mutter-11/libmutter-clutter-11.so.012:27
juliank#2  0x00007f0c3e18c1f0 in _clutter_stage_queue_event () from /usr/lib/x86_64-linux-gnu/mutter-11/libmutter-clutter-11.so.012:27
juliankoh this device does not have unattended-upgrades enabled12:28
juliankno gnome or clutter or mutter updates though12:28
juliankweird, no debug info12:31
jbichagood morning13:01
nteodosioHey jbicha, good morning!13:02
jbichahi :)13:02
seb128hey jbicha, how are you?14:08
Trevinhojuliank: no core dups for you from systemd either?14:29
juliankTrevinho: I don't get line numbers from gdb on the coredump which is weird they should be there via debuginfod14:30
Trevinhojuliank: definitely, can you see if addr2line gives you an info though?14:31
=== chiluk_ is now known as chiluk
juliankTrevinho: not that I can figure out15:20
juliankTrevinho: Well I get15:21
juliankaddr2line -f -e /usr/lib/x86_64-linux-gnu/mutter-11/libmutter-clutter-11.so.0 0x5025215:21
=== waveform_ is now known as waveform
Trevinhojuliank: I fell that gets called by JS you should figure it out by call (void) gjs_dumpstack().21:07

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!