[04:15] <KGB-2> devhelp Mohammed Sadiq 358615 * commented merge request !2 * https://deb.li/i7ICj
[07:07] <tjaalton> evince doesn't support png in kinetic?
[07:08] <tjaalton> oops, tab-complete fail :P
[07:59] <seb128> goood morning desktopers!
[08:01] <ricotz> hello seb128 
[08:03] <seb128> tjaalton, hey, our image viewer is eog not evince, why would evince open a png?
[08:03] <seb128> ricotz, hey, how are you?
[08:04] <ricotz> seb128, I am good, thanks, how are you?
[08:04] <seb128> I'm alright, thanks!
[08:04] <ricotz> seb128, I am wondering if this can be fast tracked https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/1998444
[08:04] -ubottu:#ubuntu-desktop- Launchpad bug 1998444 in tiff (Ubuntu Kinetic) "Backport security fix for CVE-2022-3970" [Critical, New]
[08:05] <seb128> ricotz, let me see if I can help nagging there
[08:06] <ricotz> seb128, <ebarretto>
[08:06] <ricotz> oops
[08:06] <ricotz> seb128, <ebarretto> answered in #ubuntu-security
[08:06] <seb128> ricotz, he's working on it?
 thanks ricotz, some colleague will sponsor it, we will let you know through the ticket or here 
[08:07] <ricotz> no idea why this CVE was only handled on xenial :\ https://ubuntu.com/security/CVE-2022-3970
[08:07] -ubottu:#ubuntu-desktop- A vulnerability was found in LibTIFF. It has been classified as critical. This affects the function TIFFReadRGBATileExt of the file libtiff/tif_getimage.c. The manipulation leads to integer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 227500897dfb07fb7d27f7aa570050e626... <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3970>
[08:10] <ricotz> still puzzling why this libreoffice test failure didn't happen weeks ago when test building
[08:14] <seb128> yeah, I don't know
[09:32] <oSoMoN> good morning desktoppers
[09:33] <seb128> oSoMoN, hey, how are you today?
[09:35] <oSoMoN> seb128, I'm fine, fully recovered from that stomach bug and the rest of the family too
[09:35] <seb128> nice to hear :)
[09:57] <tjaalton> seb128: exactly
[09:57] <tjaalton> my mistake
[09:57] <seb128> tjaalton, so eog refuses to help png files for you?
[09:58] <tjaalton> no, eog works
[09:58] <seb128> so you just got confused and that was a question to ignore? :)
[09:58] <tjaalton> yes
[09:58] <tjaalton> :)
[09:58] <tjaalton> I googled it, and saw someone else did the same mistake, heh
[09:59] <seb128> :)
[12:26] <juliank> oh, gnome-shell dumps core and I don't have apport installed because I'm developing  stuff so need to use systemd-coredump
[12:27] <juliank> #0  0x00007f0c3e148252 in ?? () from /usr/lib/x86_64-linux-gnu/mutter-11/libmutter-clutter-11.so.0
[12:27] <juliank> #1  0x00007f0c3e175579 in _clutter_process_event () from /usr/lib/x86_64-linux-gnu/mutter-11/libmutter-clutter-11.so.0
[12:27] <juliank> #2  0x00007f0c3e18c1f0 in _clutter_stage_queue_event () from /usr/lib/x86_64-linux-gnu/mutter-11/libmutter-clutter-11.so.0
[12:27] <juliank> sweet
[12:28] <juliank> oh this device does not have unattended-upgrades enabled
[12:28] <juliank> no gnome or clutter or mutter updates though
[12:31] <juliank> weird, no debug info
[13:01] <jbicha> good morning
[13:02] <nteodosio> Hey jbicha, good morning!
[13:02] <jbicha> hi :)
[14:08] <seb128> hey jbicha, how are you?
[14:11] <jbicha> good
[14:29] <Trevinho> juliank: no core dups for you from systemd either?
[14:30] <juliank> Trevinho: I don't get line numbers from gdb on the coredump which is weird they should be there via debuginfod
[14:31] <Trevinho> juliank: definitely, can you see if addr2line gives you an info though?
[15:20] <juliank> Trevinho: not that I can figure out
[15:21] <juliank> Trevinho: Well I get
[15:21] <juliank> addr2line -f -e /usr/lib/x86_64-linux-gnu/mutter-11/libmutter-clutter-11.so.0 0x50252
[15:21] <juliank> clutter_actor_set_color_state
[21:07] <Trevinho> juliank: I fell that gets called by JS you should figure it out by call (void) gjs_dumpstack().