[Bug 1573485] [NEW] Provide Tor Hidden Service for archive.ubuntu.com
Public bug reported: Debian now has mirrors as Tor Hidden Services: http://richardhartmann.de/blog/posts/2015/08/24-Tor-enabled_Debian_mirror/ http://richardhartmann.de/blog/posts/2015/08/25-Tor-enabled_Debian_mirror_part_2/ This would be great for Ubuntu, too. Description: https://www.torproject.org/docs/hidden-services.html.en Howto: https://www.torproject.org/docs/tor-hidden-service.html.en Thanks ** Affects: ubuntu Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1573485 Title: Provide Tor Hidden Service for archive.ubuntu.com To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1573485/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215361] [NEW] Please update to 29.0.1547.57
*** This bug is a security vulnerability *** Public security bug reported: And again a new stable release with lots of security fixes: http://googlechromereleases.blogspot.com/2013/08/stable-channel- update.html Here are the CVEs: CVE-2013-2887: Various fixes from internal audits, fuzzing and other initiatives (Chrome 29). CVE-2013-2900: Incomplete path sanitization in file handling. CVE-2013-2901: Integer overflow in ANGLE. CVE-2013-2902: Use after free in XSLT. CVE-2013-2903: Use after free in media element. CVE-2013-2904: Use after free in document parsing. CVE-2013-2905: Information leak via overly broad permissions on shared memory files. (I should write a script for this.) ** Affects: chromium-browser (Ubuntu) Importance: Undecided Status: New ** Information type changed from Private Security to Public Security ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2887 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2900 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2901 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2902 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2903 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2904 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2905 ** Description changed: And again a new stable release with lots of security fixes: - googlechromereleases.blogspot.com/2013/08/stable-channel-update.html + http://googlechromereleases.blogspot.com/2013/08/stable-channel- + update.html Here are the CVEs: CVE-2013-2887: Various fixes from internal audits, fuzzing and other initiatives (Chrome 29). CVE-2013-2900: Incomplete path sanitization in file handling. - CVE-2013-2901: Integer overflow in ANGLE. - CVE-2013-2902: Use after free in XSLT. - CVE-2013-2903: Use after free in media element. - CVE-2013-2904: Use after free in document parsing. + CVE-2013-2901: Integer overflow in ANGLE. + CVE-2013-2902: Use after free in XSLT. + CVE-2013-2903: Use after free in media element. + CVE-2013-2904: Use after free in document parsing. CVE-2013-2905: Information leak via overly broad permissions on shared memory files. (I should write a script for this.) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215361 Title: Please update to 29.0.1547.57 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1215361/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1207019] [NEW] Please update to 28.0.1500.95
*** This bug is a security vulnerability *** Public security bug reported: And again a new stable release with lots of security fixes: http://googlechromereleases.blogspot.com/2013/07/stable-channel- update_30.html Here are some CVEs: CVE-2013-2881: Origin bypass in frame handling. CVE-2013-2882: Type confusion in V8. CVE-2013-2883: Use-after-free in MutationObserver. CVE-2013-2884: Use-after-free in DOM. CVE-2013-2885: Use-after-free in input handling. CVE-2013-2886: Various fixes from internal audits, fuzzing and other initiatives. ** Affects: chromium-browser (Ubuntu) Importance: Undecided Status: New ** Information type changed from Private Security to Public Security ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2881 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2882 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2883 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2884 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2885 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2886 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1207019 Title: Please update to 28.0.1500.95 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1207019/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1207019] Re: Please update to 28.0.1500.95
And Debians package: http://packages.qa.debian.org/c/chromium- browser/news/20130731T071212Z.html -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1207019 Title: Please update to 28.0.1500.95 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1207019/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1199644] [NEW] Please update to 28.0.1500.71
*** This bug is a security vulnerability *** Public security bug reported: And again a new stable release with lots of security fixes: http://googlechromereleases.blogspot.com/2013/07/stable-channel- update.html Here are the CVEs: CVE-2013-2853: Man-in-the-middle attack against HTTP in SSL. CVE-2013-2867: Block pop-unders in various scenarios. CVE-2013-2868: Incorrect sync of NPAPI extension component. CVE-2013-2869: Out-of-bounds read in JPEG2000 handling. CVE-2013-2870: Use-after-free with network sockets. CVE-2013-2871: Use-after-free in input handling. CVE-2013-2872: Possible lack of entropy in renderers. CVE-2013-2873: Use-after-free in resource loading. CVE-2013-2874: Screen data leak with GL textures. CVE-2013-2875: Out-of-bounds-read in SVG. CVE-2013-2876: Extensions permissions confusion with interstitials. CVE-2013-2877: Out-of-bounds read in XML parsing. CVE-2013-2878: Out-of-bounds read in text handling. CVE-2013-2879: Confusion setting up sign-in and sync. ** Affects: chromium-browser (Ubuntu) Importance: Undecided Status: New ** Information type changed from Private Security to Public Security ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2853 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2867 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2868 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2869 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2870 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2871 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2872 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2873 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2874 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2875 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2876 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2877 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2878 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2879 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1199644 Title: Please update to 28.0.1500.71 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1199644/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1183086] Re: Please update to 27.0.1453.110
lol, even Debian Stable managed to do this: http://lists.debian.org /debian-security-announce/2013/msg00114.html -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1183086 Title: Please update to 27.0.1453.110 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1183086/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1183086] Re: Please update to 27.0.1453.93
And 27.0.1453.110: http://googlechromereleases.blogspot.com/2013/06 /stable-channel-update.html CVE-2013-2854: Bad handle passed to renderer. CVE-2013-2855: Memory corruption in dev tools API. CVE-2013-2856: Use-after-free in input handling. CVE-2013-2857: Use-after-free in image handling. CVE-2013-2858: Use-after-free in HTML5 Audio. CVE-2013-2859: Cross-origin namespace pollution. CVE-2013-2860: Use-after-free with workers accessing database APIs. CVE-2013-2861: Use-after-free with SVG. CVE-2013-2862: Memory corruption in Skia GPU handling. CVE-2013-2863: Memory corruption in SSL socket handling. CVE-2013-2864: Bad free in PDF viewer. CVE-2013-2865: Various fixes from internal audits, fuzzing and other initiatives. ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2854 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2855 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2856 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2857 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2858 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2859 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2860 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2861 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2862 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2863 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2864 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2865 ** Summary changed: - Please update to 27.0.1453.93 + Please update to 27.0.1453.110 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1183086 Title: Please update to 27.0.1453.110 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1183086/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1184866] Re: Realtek RT2700E: no more wifi in raring
OK, I tried both 3.10.0-031000rc4 from the PPa and 3.5.0-27 from Quantal. Same problem. If it's not the kernel, which component is it? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1184866 Title: Realtek RT2700E: no more wifi in raring To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1184866/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1184866] [NEW] Realtek RT2700E: no more wifi in raring
Public bug reported: I have been using Ubuntu on my MSI Wind 100 since at least Lucid. The wifi card Realtek RT2700E always worked, no more on Raring. % lspci | grep -i tek 01:00.0 Ethernet controller: Realtek Semiconductor Co., Ltd. RTL8101E/RTL8102E PCI Express Fast Ethernet controller (rev 02) % sudo ifconfig wlan0 up % iwlist wlan0 scan wlan0 No scan results % sudo grep wlan0 /var/log/kern.log May 28 09:17:26 molly kernel: [ 130.836462] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready ** Affects: linux (Ubuntu) Importance: Undecided Status: Incomplete ** Tags: raring -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1184866 Title: Realtek RT2700E: no more wifi in raring To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1184866/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1184866] Re: Realtek RT2700E: no more wifi in raring
Please tell me which log files suspecut the error to be in and I will gladly provide these parts. But I will not allow a script to upload my /var/log to public places. ** Changed in: linux (Ubuntu) Status: Incomplete = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1184866 Title: Realtek RT2700E: no more wifi in raring To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1184866/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1183086] [NEW] Please update to 27.0.1453.93
*** This bug is a security vulnerability *** Public security bug reported: And again a new stable release with lots of security fixes: http://googlechromereleases.blogspot.de/2013/05/stable-channel- release.html Here are the CVEs: CVE-2013-2837: Use-after-free in SVG. CVE-2013-2838: Out-of-bounds read in v8. CVE-2013-2839: Bad cast in clipboard handling. CVE-2013-2840: Use-after-free in media loader. CVE-2013-2841: Use-after-free in Pepper resource handling. CVE-2013-2842: Use-after-free in widget handling. CVE-2013-2843: Use-after-free in speech handling. CVE-2013-2844: Use-after-free in style resolution. CVE-2013-2845: Memory safety issues in Web Audio. CVE-2013-2846: Use-after-free in media loader. CVE-2013-2847: Use-after-free race condition with workers. CVE-2013-2848: Possible data extraction with XSS Auditor. CVE-2013-2849: Possible XSS with drag+drop or copy+paste. Please update and keep current. Thanks. ** Affects: chromium-browser (Ubuntu) Importance: Undecided Status: New ** Information type changed from Private Security to Public Security ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2837 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2838 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2839 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2840 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2841 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2842 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2843 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2844 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2847 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2848 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2845 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2846 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-2849 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1183086 Title: Please update to 27.0.1453.93 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1183086/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1161296] Re: Please update to 26.0.1410.63
Now it's 26.0.1410.63: http://googlechromereleases.blogspot.de/2013/04 /stable-channel-update.html This release contains stability improvements, and a new version of Adobe Flash: http://helpx.adobe.com/en/flash-player/release- note/fp_117_air_37_release_notes.html ** Summary changed: - Please update to 26.0.1410.43 + Please update to 26.0.1410.63 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1161296 Title: Please update to 26.0.1410.63 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1161296/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1161296] [NEW] Please update to 26.0.1410.43
*** This bug is a security vulnerability *** Public security bug reported: And again a new stable release with lots of security fixes: http://googlechromereleases.blogspot.de/2013/03/stable-channel- update_26.html Here are the CVEs: [$1000] [172342] High CVE-2013-0916: Use-after-free in Web Audio. Credit to Atte Kettunen of OUSPG. [180909] Low CVE-2013-0917: Out-of-bounds read in URL loader. Credit to Google Chrome Security Team (Cris Neckar). [180555] Low CVE-2013-0918: Do not navigate dev tools upon drag and drop. Credit to Vsevolod Vlasov of the Chromium development community. [Linux only] [178760] Medium CVE-2013-0919: Use-after-free with pop-up windows in extensions. Credit to Google Chrome Security Team (Mustafa Emre Acer). [177410] Medium CVE-2013-0920: Use-after-free in extension bookmarks API. Credit to Google Chrome Security Team (Mustafa Emre Acer). [174943] High CVE-2013-0921: Ensure isolated web sites run in their own processes. [174129] Low CVE-2013-0922: Avoid HTTP basic auth brute force attempts. Credit to “t3553r”. [169981] [169972] [169765] Medium CVE-2013-0923: Memory safety issues in the USB Apps API. Credit to Google Chrome Security Team (Mustafa Emre Acer). [169632] Low CVE-2013-0924: Check an extension’s permissions API usage again file permissions. Credit to Benjamin Kalman of the Chromium development community. [168442] Low CVE-2013-0925: Avoid leaking URLs to extensions without the tabs permissions. Credit to Michael Vrable of Google. [112325] Medium CVE-2013-0926: Avoid pasting active tags in certain situations. Credit to Subho Halder, Aditya Gupta, and Dev Kar of xys3c (xysec.com). ** Affects: chromium-browser (Ubuntu) Importance: Undecided Status: New ** Information type changed from Private Security to Public Security ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0916 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0917 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0918 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0919 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0920 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0921 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0922 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0923 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0924 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0925 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0926 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1161296 Title: Please update to 26.0.1410.43 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1161296/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1154460] [NEW] new upstream release: 25.0.1364.172
*** This bug is a security vulnerability *** Public security bug reported: And again a new stable release: http://googlechromereleases.blogspot.de/2013/03/stable-channel-update_12.html Comes with a new Flash: https://www.adobe.com/support/security/bulletins/apsb13-09.html Here are the CVEs: - These updates resolve an integer overflow vulnerability that could lead to code execution (CVE-2013-0646). - These updates resolve a use-after-free vulnerability that could be exploited to execute arbitrary code (CVE-2013-0650). - These updates resolve a memory corruption vulnerability that could lead to code execution (CVE-2013-1371). - These updates resolve a heap buffer overflow vulnerability that could lead to code execution (CVE-2013-1375). ** Affects: chromium-browser (Ubuntu) Importance: Undecided Status: New ** Information type changed from Private Security to Public Security ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0646 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0650 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-1371 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-1375 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1154460 Title: new upstream release: 25.0.1364.172 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1154460/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1132568] Re: Please update to 25.0.1364.97
When will syncing be possible again? Here are the CVE references: CVE-2013-0900: Race condition in ICU. Credit to Google Chrome Security Team (Inferno). CVE-2013-0899: Integer overflow in Opus handling. Credit to Google Chrome Security Team (Jüri Aedla). CVE-2013-0898: Use-after-free in URL handling. Credit to Alexander Potapenko of the Chromium development community. CVE-2013-0897: Off-by-one read in PDF. Credit to Mateusz Jurczyk, with contributions by Gynvael Coldwind, both from Google Security Team. CVE-2013-0896: Memory management issues in plug-in message handling. Credit to Google Chrome Security Team (Cris Neckar). CVE-2013-0895: Incorrect path handling in file copying. Credit to Google Chrome Security Team (Jüri Aedla). CVE-2013-0894: Buffer overflow in vorbis decoding. Credit to Google Chrome Security Team (Inferno). CVE-2013-0893: Race condition in media handling. Credit to Andrew Scherkus of the Chromium development community. CVE-2013-0892: Lower severity issues across the IPC layer. Credit to Google Chrome Security Team (Chris Evans). CVE-2013-0891: Integer overflow in blob handling. Credit to Google Chrome Security Team (Jüri Aedla). CVE-2013-0890: Memory safety issues across the IPC layer. Credit to Google Chrome Security Team (Chris Evans). CVE-2013-0889: Tighten user gesture check for dangerous file downloads. CVE-2013-0888: Out-of-bounds read in Skia. Credit to Google Chrome Security Team (Inferno). CVE-2013-0887: Developer tools process has too many permissions and places too much trust in the connected server. CVE-2013-0886: Incorrect NaCl signal handling. Credit to Mark Seaborn of the Chromium development community. CVE-2013-0885: Too many API permissions granted to web store. CVE-2013-0884: Inappropriate load of NaCl. Credit to Google Chrome Security Team (Chris Evans). CVE-2013-0883: Bad read in Skia. Credit to Atte Kettunen of OUSPG. CVE-2013-0882: Bad memory access with excessive SVG parameters. Credit to Renata Hodovan. CVE-2013-0881: Bad read in Matroska handling. Credit to Atte Kettunen of OUSPG. CVE-2013-0880: Use-after-free in database handling. Credit to Chamal de Silva. CVE-2013-0879: Memory corruption with web audio node. Credit to Atte Kettunen of OUSPG. ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0879 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0880 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0881 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0882 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0883 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0884 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0885 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0886 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0887 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0888 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0889 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0890 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0891 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0892 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0893 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0894 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0895 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0896 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0897 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0898 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0899 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0900 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1132568 Title: Please update to 25.0.1364.97 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1132568/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1132568] Re: Please update to 25.0.1364.152
And another release: http://googlechromereleases.blogspot.de/2013/03 /stable-channel-update_4.html The new CVEs: [$1000] [176882] High CVE-2013-0902: Use-after-free in frame loader. Credit to Chamal de Silva. [$1000] [176252] High CVE-2013-0903: Use-after-free in browser navigation handling. Credit to “chromium.khalil”. [$2000] [172926] [172331] High CVE-2013-0904: Memory corruption in Web Audio. Credit to Atte Kettunen of OUSPG. [$1000] [168982] High CVE-2013-0905: Use-after-free with SVG animations. Credit to Atte Kettunen of OUSPG. [174895] High CVE-2013-0906: Memory corruption in Indexed DB. Credit to Google Chrome Security Team (Jüri Aedla). [174150] Medium CVE-2013-0907: Race condition in media thread handling. Credit to Andrew Scherkus of the Chromium development community. [174059] Medium CVE-2013-0908: Incorrect handling of bindings for extension processes. [173906] Low CVE-2013-0909: Referer leakage with XSS Auditor. Credit to Egor Homakov. [172573] Medium CVE-2013-0910: Mediate renderer - browser plug-in loads more strictly. Credit to Google Chrome Security Team (Chris Evans). [172264] High CVE-2013-0911: Possible path traversal in database handling. Credit to Google Chrome Security Team (Jüri Aedla). ** Summary changed: - Please update to 25.0.1364.97 + Please update to 25.0.1364.152 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0902 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0903 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0904 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0905 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0906 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0907 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0908 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0909 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0910 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0911 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1132568 Title: Please update to 25.0.1364.152 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1132568/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1099075] Re: new upstream release: 24.0.1312.56
And again: 24.0.1312.56 Security fixes: * [$1000] [151008] High CVE-2013-0839: Use-after-free in canvas font handling. Credit to Atte Kettunen of OUSPG. * [170532] Medium CVE-2013-0840: Missing URL validation when opening new windows. * [169770] High CVE-2013-0841: Unchecked array index in content blocking. Credit to Google Chrome Security Team (Chris Evans). * [166867] Medium CVE-2013-0842: Problems with NULL characters embedded in paths. Credit to Google Chrome Security Team (Jüri Aedla). * [Mac only] [166523] High CVE-2013-0843: Crash with unsupported RTC sampling rate. Credit to Ted Nakamura of the Chromium development community. I don't know why you edited this out of my original description: From a security perspective, having no Chromium package at all would be better than having outdated ones with gaping holes. ** Summary changed: - new upstream release: 24.0.1312.52 + new upstream release: 24.0.1312.56 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0839 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0840 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0841 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0842 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0843 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1099075 Title: new upstream release: 24.0.1312.56 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1099075/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1101843] [NEW] new upstream release: 18.0.1
Public bug reported: Changelog: https://www.mozilla.org/en- US/firefox/18.0.1/releasenotes/buglist.html ** Affects: firefox (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1101843 Title: new upstream release: 18.0.1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/firefox/+bug/1101843/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1101843] Re: new upstream release: 18.0.1
Care to explain the relevance of a weekday for software upgrades? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1101843 Title: new upstream release: 18.0.1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/firefox/+bug/1101843/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1099075] [NEW] new upstream release: 24.0.1312.52
*** This bug is a security vulnerability *** Public security bug reported: And again a new stable release: 24.0.1312.52. As always, it comes with *lots* of security fixes (http://googlechromereleases.blogspot.de/2013/01/stable-channel-update.html), including a Flash update (http://helpx.adobe.com/en/flash-player/release-note/fp_115_air_35_release_notes.html) Please update the Ubuntu package to the newest version and keep it current, as you do with Firefox. From a security perspective, having no Chromium package at all would be better than having outdated ones with gaping holes. ** Affects: chromium-browser (Ubuntu) Importance: Undecided Status: New ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1099075 Title: new upstream release: 24.0.1312.52 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1099075/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1086613] Re: Please update to 23.0.1271.97
Ok, here's the new one: #1099075 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1086613 Title: Please update to 23.0.1271.97 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1086613/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1086613] Re: Please update to 24.0.1312.52
And again a new stable release: 24.0.1312.52. As always, it comes with *lots* of security fixes (http://googlechromereleases.blogspot.de/2013/01/stable-channel-update.html), including a Flash update (http://helpx.adobe.com/en/flash-player/release-note/fp_115_air_35_release_notes.html) Please update the Ubuntu package to the newest version and keep it current, as you do with Firefox. From a security perspective, having no Chromium package at all would be better than having outdated ones with gaping holes. ** Summary changed: - Please update to 23.0.1271.97 + Please update to 24.0.1312.52 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1086613 Title: Please update to 24.0.1312.52 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1086613/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 824961] Re: Ubuntu 11.04 Server with encrypted LVM on dm RAID0 -- Incorrect metadata area header checksum - No volume groups found - ALERT! /dev/mapper/MachineName-root does not exist
I got exactly the same behavior as #11. Maybe we sould file a new bug, since the rest works? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/824961 Title: Ubuntu 11.04 Server with encrypted LVM on dm RAID0 -- Incorrect metadata area header checksum - No volume groups found - ALERT! /dev/mapper/MachineName-root does not exist To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/824961/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 925760] Re: Constant warnings from the kernel: Test WP failed, assume Write Enabled
Just blacklist the module in /etc/modprobe.d/blacklist.conf -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/925760 Title: Constant warnings from the kernel: Test WP failed, assume Write Enabled To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/925760/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 992068] Re: broken in 12.04: libtorsocks: many symbols not found
This is still present in torsocks 1.2-3 amd64 in Quantal release. It's especially annoying, since this has been fixed in Debians 1.2-3, but Ubuntu 1.2-3 ships with a different /usr/lib/torsocks/libtorsocks.a and /usr/lib/torsocks/libtorsocks.so.1.0.0 than Debian. ** Summary changed: - broken in 12.04: libtorsocks: many symbols not found + broken in 12.04 and 12.10: libtorsocks: many symbols not found -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/992068 Title: broken in 12.04 and 12.10: libtorsocks: many symbols not found To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/torsocks/+bug/992068/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 992068] Re: broken in 12.04 and 12.10: libtorsocks: many symbols not found
And apt thinks the 1.2-3 from Ubuntu is more current than the 1.2-3 from Debian. So working around this needs apt-pinning :( -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/992068 Title: broken in 12.04 and 12.10: libtorsocks: many symbols not found To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/torsocks/+bug/992068/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1004983] Re: X.org segfaults when exiting window manager
I can confirm 2:1.11.4-0ubuntu10.3 fixed it. Thanks! A little report-back would've been nice :) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1004983 Title: X.org segfaults when exiting window manager To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1004983/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1004983] Re: X.org segfaults when exiting window manager
Siep: After X.org segfaults, switching TTYs doesn't work any more. Also, I don't want to shut down my system when exiting X.org. And I want to restart X.org later. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1004983 Title: X.org segfaults when exiting window manager To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1004983/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 925760] Re: Constant warnings from the kernel: Test WP failed, assume Write Enabled
Same here, anything you need for it to progress? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/925760 Title: Constant warnings from the kernel: Test WP failed, assume Write Enabled To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/925760/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1004983] Re: X.org segfaults when exiting window manager
Anything you need for this? This is highly annoying and should be treated with high priority, being a regression. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1004983 Title: X.org segfaults when exiting window manager To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1004983/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 778659] Re: boot cryptsetup passphrase prompt echoes typed characters as stars
What's the holdup here? Do you not think this is a bug? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/778659 Title: boot cryptsetup passphrase prompt echoes typed characters as stars To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/778659/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1004983] Re: X.org segfaults when exiting window manager
Oh, and on the other box, I first tried it with xserver-(xorg-core|common) 1.11.4-0ubuntu10.1, where this bug didn't kick in. Then upgraded to 1.11.4-0ubuntu10.2, and it arrived. So, this probably qualifies as Importance High, since it's a regression. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1004983 Title: X.org segfaults when exiting window manager To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1004983/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1004983] Re: X.org segfaults when exiting window manager
Reproduced this on another box. ** Attachment added: Xorg.0.log https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1004983/+attachment/3167015/+files/Xorg.0.log -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1004983 Title: X.org segfaults when exiting window manager To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1004983/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1004983] Re: Current Precise: TTY freezes, DVI stops working
Got it. It's xserver-(xorg-core|common), starting with the upgrade from 1.11.4-0ubuntu10.1 to 1.11.4-0ubuntu10.2. I start X with xinit and an xinitrc like attached. When quitting my window manager, X.org segaults. /var/log/syslog sais: [ 8107.274733] Xorg[2365]: segfault at c0 ip 7fc6070a6558 sp 7f878570 error 4 in Xorg[7fc607051000+1f] [ 8108.143659] init: tty1 main process ended, respawning ** Attachment added: xinitrc https://bugs.launchpad.net/ubuntu/+bug/1004983/+attachment/3165564/+files/xinitrc -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1004983 Title: X.org segfaults when exiting window manager To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1004983/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1004983] Re: Current Precise: TTY freezes, DVI stops working
Segmentation fault at address 0xc0 Caught signal 11 (Segmentation fault). Server aborting ** Attachment added: Xorg.0.log https://bugs.launchpad.net/ubuntu/+bug/1004983/+attachment/3165565/+files/Xorg.0.log -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1004983 Title: X.org segfaults when exiting window manager To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1004983/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1004983] Re: Current Precise: TTY freezes, DVI stops working
Segmentation fault at address 0xc0 Caught signal 11 (Segmentation fault). Server aborting ** Attachment added: Xorg.0.log.old https://bugs.launchpad.net/ubuntu/+bug/1004983/+attachment/3165566/+files/Xorg.0.log.old ** Package changed: ubuntu = xorg-server (Ubuntu) ** Summary changed: - Current Precise: TTY freezes, DVI stops working + X.org segfaults when exiting window manager -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1004983 Title: X.org segfaults when exiting window manager To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1004983/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1005117] Re: Xorg segfaults when closing, leaving system unresonsive
*** This bug is a duplicate of bug 1004983 *** https://bugs.launchpad.net/bugs/1004983 ** This bug has been marked a duplicate of bug 1004983 X.org segfaults when exiting window manager -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1005117 Title: Xorg segfaults when closing, leaving system unresonsive To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1005117/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1004983] [NEW] Current Precise: TTY freezes, DVI stops working
Public bug reported: I've been running up-to-date stable for a few releases. Since a few days my system freezes. Maybe it's been since installing and booting into linux-image-3.2.0-24-generic, but I'm not sure. When I leave, I exit X.org, drop into TTY1 and log out there. When returning, my monitor won't find a DVI signal any mroe. Plugging DVI out and back in returns video output, but the boot log screen. I am unable to switch between TTYs or log in. SSH still works and everything seems to run fine. But without being able to log in locally, I have no chance but to reboot. This is highly annoying, and really new. I don't want to post all my logs, any idea where to look? ** Affects: ubuntu Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1004983 Title: Current Precise: TTY freezes, DVI stops working To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1004983/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 876626] Re: Unlocking the second crypto disk (/home) echos password on console
Thanks for finally looking into this. While on this, please also look at #778659. I do not agree with Comment #33 that [obscuring] the entered passphrase and [displaying] asterisks is correct. It should not display any input, as cryptsetup(8), cryptdisks_start(8), passwd(1), gpg(1) and all others do. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/876626 Title: Unlocking the second crypto disk (/home) echos password on console To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/876626/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 876626] Re: Unlocking the second crypto disk (/home) echos password on console
Note to self: Encryption of data volumes on a headless system is a corner case. Ubuntu is designed with security in mind. https://wiki.ubuntu.com/LTS -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/876626 Title: Unlocking the second crypto disk (/home) echos password on console To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/876626/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 876626] Re: Unlocking the second crypto disk (/home) echos password on console
Are you shitting me? Half a year and one release later, you're delaying this again? You're shipping this on a production LTS? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/876626 Title: Unlocking the second crypto disk (/home) echos password on console To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/876626/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 876626] Re: Unlocking the second crypto disk (/home) echos password on console
Still present in current Beta 2, three days until FinalFreeze. Way to go for LTS! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/876626 Title: Unlocking the second crypto disk (/home) echos password on console To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/876626/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 876626] Re: Unlocking the second crypto disk (/home) echos password on console
Yeah, it's not like this should be a priority, so taking four months without progress is completely ok. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/876626 Title: Unlocking the second crypto disk (/home) echos password on console To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/876626/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 876626] Re: Unlocking the second crypto disk (/home) echos password on console
@Benjamin: I am grateful for general FLOSS development, but I am totally pissed at the way Ubuntu is handling passphrase input for crypto disks at boot. It started almost two years ago with bug 566818. Then it became a security issue last year with bug 778659. Now this on has been idling for four months. I would be able to look over this, if there were clear responsibilities and a working process, fixing it in a reasonable time frame. But it's Importance: Undecided for plymouth and Oneiric? It's only assigned to someone in Precise upstart, too? Why has the assignee not commented here once? If plymouth may be responsible, has upstream been contacted? (Nothing in their Bugtracker). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/876626 Title: Unlocking the second crypto disk (/home) echos password on console To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/876626/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 880348] Re: boot cryptsetup passphrase prompt displays passphrase in clear text
*** This bug is a duplicate of bug 876626 *** https://bugs.launchpad.net/bugs/876626 ** This bug is no longer a duplicate of bug 877403 crypttab LUKS password shown in cleartext ** This bug has been marked a duplicate of bug 876626 Unlocking the second crypto disk (/home) echos password on console -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/880348 Title: boot cryptsetup passphrase prompt displays passphrase in clear text To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/880348/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 877403] Re: crypttab LUKS password shown in cleartext
*** This bug is a duplicate of bug 876626 *** https://bugs.launchpad.net/bugs/876626 ** This bug has been marked a duplicate of bug 876626 Unlocking the second crypto disk (/home) echos password on console -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/877403 Title: crypttab LUKS password shown in cleartext To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/upstart/+bug/877403/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 839595] Re: failsafe.conf's 30 second time out is too low
The workaround only fixes the waiting time. It disables auto-up of the interface, which I want, if it us plugged in. This is a regression and still a major annoyance for me. Closing this bug report is not right, this isn't the fault of ifupdown, but upstart. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/839595 Title: failsafe.conf's 30 second time out is too low To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-release-notes/+bug/839595/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 878815] Re: mplayer: Symbol `ff_codec_bmp_tags' has different size in shared object, consider re-linking
This is an mplayer package problem, not a Medibuntu problem. oneiric-staging seems to be Medibuntu only. ** Project changed: medibuntu = mplayer (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/878815 Title: mplayer: Symbol `ff_codec_bmp_tags' has different size in shared object, consider re-linking To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mplayer/+bug/878815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 880348] [NEW] boot cryptsetup passphrase prompt displays passphrase in clear text
*** This bug is a security vulnerability *** Public security bug reported: Since updating to oneiric, plymouth displays the boot cryptsetup passphrases in the clear! It's asterisks on the first device, which alone is a problem, see bug 778659. Filing this new bug, since passphrases in the clear are another can of worms. ** Affects: plymouth (Ubuntu) Importance: Undecided Status: New ** Visibility changed to: Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/880348 Title: boot cryptsetup passphrase prompt displays passphrase in clear text To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/880348/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 880348] Re: boot cryptsetup passphrase prompt displays passphrase in clear text
*** This bug is a duplicate of bug 877403 *** https://bugs.launchpad.net/bugs/877403 Wow! I commented it 10-13, the other report was filed on 10-18. Way to take this seriously. (Yes Ubuntu, I am pissed.) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/880348 Title: boot cryptsetup passphrase prompt displays passphrase in clear text To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/880348/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 839595] Re: failsafe.conf's 30 second time out is too low
I don't like this behavior. I have eth0 auto in /etc/network/interfaces, so that it gets auto-enabled when plugged in. This being a laptop it gets moved around and doesn't always have an ethernet connection plugged in. No I'm supposed to wait two minutes on every boot OR not have the interface connected? Both are no real options for me. What does this mean? only servers and dedicated workstations should have network interfaces configured in this way How else should I have my interface configured? BTW, I do not run Gnome, KDE or any other of those desktop environments. I do not have NetworkManager installed and won't install it for this. I deleted my /etc/init/failsafe.conf for now. But I really think this behavior shouldn't be forced. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/839595 Title: failsafe.conf's 30 second time out is too low To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-release-notes/+bug/839595/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 839595] Re: failsafe.conf's 30 second time out is too low
Thanks for your workaround, using that now. I still think it's wrong to assume that one of these three has to exist on a system: - auto eth0 and eth0 always plugged in - network-manager installed - boot time delayed by two minutes. And no, I won't install network-manager even if it doesn't depend on X. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/839595 Title: failsafe.conf's 30 second time out is too low To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-release-notes/+bug/839595/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 778659] Re: boot cryptsetup passphrase prompt echoes typed characters as stars
Nope, still the same on a freshly updated 11.10. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/778659 Title: boot cryptsetup passphrase prompt echoes typed characters as stars To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/778659/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 778659] Re: boot cryptsetup passphrase prompt echoes typed characters as stars
OMFG. Updated another box. It still displays a star for every character when unlocking the first (system) disk. But it displays the plain passphrases for all my other disks after the first one! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/778659 Title: boot cryptsetup passphrase prompt echoes typed characters as stars To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/778659/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 778659] Re: boot cryptsetup passphrase prompt echoes typed characters as stars
Can anyone else check this out please? Then raise the Importance to Critical. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/778659 Title: boot cryptsetup passphrase prompt echoes typed characters as stars To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/778659/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 92383] Re: WRITE@LBA=288830h failed with SK=7h/ASC=00h/ACQ=00h]: Input/output error
I just hit this on an up to date Natty with growisofs 7.1-9 and linux- image-2.6.38-11-generic 2.6.38-11.50: growisofs: Executing 'builtin_dd if=roor-rangoex-dvdr.img of=/dev/sr0 obs=32k seek=0' /dev/sr0: Current Write Speed is 16.4x1352KBps. :-[ WRITE@LBA=0h failed with SK=0h/ASC=00h/ACQ=02h]: Input/output error :-( write failed: Input/output error /var/log/kern.log ata6.00: exception Emask 0x0 SAct 0x0 SErr 0x0 action 0x6 frozen CDB: Write(10): 2a 00 00 00 00 00 00 00 10 00 ata6.00: cmd a0/01:00:00:00:80/00:00:00:00:00/a0 tag 0 dma 32768 out res 40/00:02:00:18:00/00:00:00:00:00/a0 Emask 0x4 (timeout) ata6.00: status: { DRDY } ata6: hard resetting link ata6: SATA link up 1.5 Gbps (SStatus 113 SControl 310) ata6.00: configured for UDMA/100 ata6: EH complete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/92383 Title: WRITE@LBA=288830h failed with SK=7h/ASC=00h/ACQ=00h]: Input/output error To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/dvd+rw-tools/+bug/92383/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 92383] Re: WRITE@LBA=288830h failed with SK=7h/ASC=00h/ACQ=00h]: Input/output error
I was able to burn the same command on the exact same hardware and software setup after a reboot. This is the second time I hit this bug in about five burn times. I cannot make a pattern yet. When it happens, the drive in question is locked by the kernel and still spinning when it happens. Only a cold reboot fixes this, sudo reboot now didn't help. This is highly annoying, wasting an empty DVD and having to reboot! hdparm also fails: % sudo hdparm -d 0 /dev/sr0 /dev/sr0: setting using_dma to 0 (off) HDIO_SET_DMA failed: Inappropriate ioctl for device HDIO_GET_DMA failed: Inappropriate ioctl for device % sudo hdparm /dev/sr0 /dev/sr0: multcount = 0 (off) IO_support= 0 (default) readonly = 0 (off) readahead = 256 (on) HDIO_GETGEO failed: Inappropriate ioctl for device -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/92383 Title: WRITE@LBA=288830h failed with SK=7h/ASC=00h/ACQ=00h]: Input/output error To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/dvd+rw-tools/+bug/92383/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 793628] Re: incorrectly hangs waiting for user confirmation
And again. This time the first apticron process seems to spawn a kworker just hanging there. root 16809 0.0 0.0 35732 1096 ?S07:59 0:00 CRON root 16810 0.0 0.0 4220 588 ?Ss 07:59 0:00 /bin/sh -c apticron root 16811 0.0 0.0 12336 1708 ?S07:59 0:00 /bin/bash -e /usr/sbin/apticron root 16860 0.0 0.0 0 0 ?S07:59 0:00 [kworker/0:1] root 20478 0.0 0.0 35732 1096 ?S08:59 0:00 CRON root 20479 0.0 0.0 4220 588 ?Ss 08:59 0:00 /bin/sh -c apticron root 20480 0.0 0.0 12336 1708 ?S08:59 0:00 /bin/bash -e /usr/sbin/apticron root 20559 0.0 0.0 12336 1184 ?S08:59 0:00 /bin/bash -e /usr/sbin/apticron root 20560 0.0 0.0 12336 824 ?S08:59 0:00 /bin/bash -e /usr/sbin/apticron root 20564 0.0 0.0 6300 604 ?S08:59 0:00 /usr/bin/mailx -a MIME-Version: 1.0 -a Content-type: text/plain; charset=UTF-8 -a Content-transfer-encoding: 8bit -s 3 Ubuntu package update(s) for flatline root root 20624 0.0 0.3 63472 13808 ?S08:59 0:00 /usr/bin/python /usr/bin/apt-listchanges --which=both --headers -f text /var/cache/apt/archives/lyx_2.0.0-1~natty1_amd64.deb /var/cache/apt/archives/lyx-common_2.0.0-1~natty1_all.deb /var/cache/apt/archives/update-manager-core_1%3a0.150.3_amd64.deb root 20636 0.0 0.6 47140 24800 ?S08:59 0:00 apt-get changelog lyx=2.0.0-1~natty1 root 20645 0.0 0.0 4220 588 ?S08:59 0:00 /bin/sh /usr/bin/sensible-pager /tmp/apt-changelog-xCp56tchangelog root 20646 0.0 0.0 4220 604 ?S08:59 0:00 /bin/sh /usr/bin/pager /tmp/apt-changelog-xCp56tchangelog root 20740 0.0 0.0 33464 3336 ?S08:59 0:00 vim -R -c let no_plugin_maps = 1 -c set scrolloff=999 -c runtime! macros/less.vim -c set foldlevel=999 -c set mouse=h -c set nonu -c nmap ESCu :nohlsearchcr /tmp/apt-changelog-xCp56tchangelog -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/793628 Title: incorrectly hangs waiting for user confirmation To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apt-listchanges/+bug/793628/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 793628] Re: incorrectly hangs waiting for user confirmation
This doesn't happen every time, but now I have it again.Output from ps aux | grep -v grep | grep (apticron|apt-listchanges|pager): root 7052 0.0 0.0 35736 1124 ?S13:59 0:00 CRON root 7053 0.0 0.0 4220 584 ?Ss 13:59 0:00 /bin/sh -c apticron root 7054 0.0 0.0 12336 1712 ?S13:59 0:00 /bin/bash -e /usr/sbin/apticron root 7146 0.0 0.0 12340 1192 ?S13:59 0:00 /bin/bash -e /usr/sbin/apticron root 7147 0.0 0.0 12336 824 ?S13:59 0:00 /bin/bash -e /usr/sbin/apticron root 7151 0.0 0.0 6300 668 ?S13:59 0:00 /usr/bin/mailx -a MIME-Version: 1.0 -a Content-type: text/plain; charset=UTF-8 -a Content-transfer-encoding: 8bit -s 11 Ubuntu package update(s) for flatline root root 7323 0.0 0.3 63432 13764 ?S13:59 0:00 /usr/bin/python /usr/bin/apt-listchanges --which=both --headers -f text /var/cache/apt/archives/cups_1.4.6-5ubuntu1.2_amd64.deb /var/cache/apt/archives/cups-bsd_1.4.6-5ubuntu1.2_amd64.deb /var/cache/apt/archives/cups-client_1.4.6-5ubuntu1.2_amd64.deb /var/cache/apt/archives/cups-common_1.4.6-5ubuntu1.2_all.deb /var/cache/apt/archives/cups-ppdc_1.4.6-5ubuntu1.2_amd64.deb /var/cache/apt/archives/libcups2_1.4.6-5ubuntu1.2_amd64.deb /var/cache/apt/archives/libcupscgi1_1.4.6-5ubuntu1.2_amd64.deb /var/cache/apt/archives/libcupsdriver1_1.4.6-5ubuntu1.2_amd64.deb /var/cache/apt/archives/libcupsimage2_1.4.6-5ubuntu1.2_amd64.deb /var/cache/apt/archives/libcupsmime1_1.4.6-5ubuntu1.2_amd64.deb /var/cache/apt/archives/libcupsppdc1_1.4.6-5ubuntu1.2_amd64.deb root 7335 0.0 0.5 46460 24184 ?S13:59 0:00 apt-get changelog cups=1.4.6-5ubuntu1.2 root 7344 0.0 0.0 4220 588 ?S13:59 0:00 /bin/sh /usr/bin/sensible-pager /tmp/apt-changelog-nFISUschangelog root 7345 0.0 0.0 4220 604 ?S13:59 0:00 /bin/sh /usr/bin/pager /tmp/apt-changelog-nFISUschangelog root 7439 0.0 0.0 33688 3540 ?S13:59 0:00 vim -R -c let no_plugin_maps = 1 -c set scrolloff=999 -c runtime! macros/less.vim -c set foldlevel=999 -c set mouse=h -c set nonu -c nmap ESCu :nohlsearchcr /tmp/apt-changelog-nFISUschangelog Why is it calling the pager? It should not do this. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/793628 Title: incorrectly hangs waiting for user confirmation To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apt-listchanges/+bug/793628/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 216847] Re: sshd will not start at boot if ListenAddress is set, because network interface is not yet up
Three years and six releases later, this is still present :( -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/216847 Title: sshd will not start at boot if ListenAddress is set, because network interface is not yet up To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/216847/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 216847] Re: sshd will not start at boot if ListenAddress is set, because network interface is not yet up
Three years and six releases later, this is still present :( -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/216847 Title: sshd will not start at boot if ListenAddress is set, because network interface is not yet up To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/216847/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 793628] [NEW] incorrectly hangs waiting for user confirmation
Public bug reported: Binary package hint: apt-listchanges I call apt-listchanges 2.85.6ubuntu1 from apticron 1.1.45. Since the Upgrade to Natty, it just hung there for the second time, spawning the pager and apparently waiting for user input. It should not do that, since I specified both frontend=text and confirm=0 in the config: % cat /etc/apt/listchanges.conf [apt] frontend=text email_address= confirm=0 save_seen=/var/lib/apt/listchanges.db which=both ** Affects: apt-listchanges (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/793628 Title: incorrectly hangs waiting for user confirmation -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 566818] Re: Cryptsetup passphrase prompt during boot: every character typed repeats the prompt
This is only partly fixed. When the prompt is cleared, it still prints a new line. See hitting ESC when empty, or ^U at any stage. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/566818 Title: Cryptsetup passphrase prompt during boot: every character typed repeats the prompt -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 566818] Re: Cryptsetup passphrase prompt during boot: every character typed repeats the prompt
I can confirm the new package fixed the newline issue. But my general problem from #3 remains: Now the amount of characters in the passphrase is echoed (with stars), before it was silent like sudo f.e. The amount of characters typed is still displayed with starts, this should be empty. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/566818 Title: Cryptsetup passphrase prompt during boot: every character typed repeats the prompt -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 566818] Re: Cryptsetup passphrase prompt during boot: every character typed repeats the prompt
So the cosmetic problem is fixed, the security issue ignored? Whoah. Should the new bug be against plymouth or cryptsetup? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/566818 Title: Cryptsetup passphrase prompt during boot: every character typed repeats the prompt -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 778659] [NEW] boot cryptsetup passphrase prompt echoes typed characters as stars
*** This bug is a security vulnerability *** Public security bug reported: Binary package hint: plymouth So #566818 is fixed and plymouth no longer causes the cryptsetup passphrase prompt during boot to repeat the prompt with every character typed. It still echoes an asterisk for every character typed. I consider this a security issue, since this reveals on the screen how many characters the passphrase consists of. sudo and cryptsetup (and many others) do not echo anything when typing in passphrases. This is a deliberate security feature. plymouth should respect this and also not echo enything after the prompt. ** Affects: plymouth (Ubuntu) Importance: Undecided Status: New ** Visibility changed to: Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/778659 Title: boot cryptsetup passphrase prompt echoes typed characters as stars -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 566818] Re: Cryptsetup passphrase prompt during boot: every character typed repeats the prompt
There's a reason sudo and cryptsetup don't echo anything. It's called security. Anyways, here's the new bug: https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/778659 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/566818 Title: Cryptsetup passphrase prompt during boot: every character typed repeats the prompt -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 566818] Re: [Lucid] cryptsetup passphrase prompt during boot: every character typed repeats the prompt
Until now I only used upgraded Ubuntu versions and thought it might be some old config. But no, this is present on a freshly installed Maverick, too! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/566818 Title: [Lucid] cryptsetup passphrase prompt during boot: every character typed repeats the prompt -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 665813] [NEW] mplayer freezes with green screen
Public bug reported: Binary package hint: mplayer Version: 2:1.0~rc4~try1.dsfg1-1ubuntu1 After an upgrade from Lucid to Maverick, mplayer started to sometimes freeze. Immediately when starting to play a video, mplayer outputs no audio, only shows a green screen and even freezes X. I can't exactly reproduce it, this happens 1 out of 5-10 times I play a video. It's not limited to a certain file, either. I had vo=vdpau,xv,x11 in mplayer.conf at first, also tried vo=xv,x11 and now use the default, which uncomments # vo=. All the same. ** Affects: mplayer (Ubuntu) Importance: Undecided Status: New -- mplayer freezes with green screen https://bugs.launchpad.net/bugs/665813 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 566818] Re: [Lucid] cryptsetup passphrase prompt during boot: every character typed repeats the prompt
I can confirm that this is still present on a freshly upgraded Maverick release. The importance should be increased, since as I said in #3, this is not only annoying, but a security implication, displaying how many characters my passphrase consists of. I hope we don't have to wait for another release to finally fix this. -- [Lucid] cryptsetup passphrase prompt during boot: every character typed repeats the prompt https://bugs.launchpad.net/bugs/566818 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 407972] Re: Update kismet to latest version
And even newer: 2010-07-R1 from Tue Jul 13 2010: Re-architected and bug-fixed IPC subsystem, hidedata option to prevent any processing of data frames, general internal bugfixes and improvements, ruby API and examples, zero-priv drone-only options. http://www.kismetwireless.net/download.shtml -- Update kismet to latest version https://bugs.launchpad.net/bugs/407972 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 630085] [NEW] new upstream 0.7.94
Public bug reported: Binary package hint: libgpod4 0.7.94 of libgpod has been released, adding support for newer iPod models: http://sourceforge.net/projects/gtkpod/files/ ** Affects: libgpod (Ubuntu) Importance: Undecided Status: New -- new upstream 0.7.94 https://bugs.launchpad.net/bugs/630085 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 615382] Re: burning fails to reload tray
And bad again. Didn't reboot, didn't update, didn't change settings. This is driving me nuts. -- burning fails to reload tray https://bugs.launchpad.net/bugs/615382 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 615382] Re: burning fails to reload tray
This is probably related: Sometimes, when ejecting the tray of my CD/DVD-R drive, it opens a little, but immediately closes again. WTF. -- burning fails to reload tray https://bugs.launchpad.net/bugs/615382 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 615382] Re: burning fails to reload tray
Euh, yeah. Now it works again. I have no idea, what changed. The program versions are still the same and I didn't touch their config. -- burning fails to reload tray https://bugs.launchpad.net/bugs/615382 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 615382] Re: burning fails to reload tray
** Changed in: dvd+rw-tools (Ubuntu) Status: New = Confirmed -- burning fails to reload tray https://bugs.launchpad.net/bugs/615382 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 447604] Re: xpdf warnings Cannot convert string * to type FontStruct
Ah, with both gsfonts-x11 and poppler-data installed, the Warning messages go away. I think the .deb should suggest these two. Right now they are nowhere mentioned. Through your links I came to this site suggesting the problem lies upstream: http://zinser.no-ip.info/vms/sw/notes/xpdf.htmlx The following issues were reported by OpenVMS users of Xpdf. They are acknowledged by the author of Xpdf and should be resolved during the next couple of maintenance releases During startup of Xpdf the message Warning: Cannot convert string -*-times-medium-r-normal--16-*-*-*-*-*-iso8859-1 to type FontStruct is displayed This message can be safely ignored. This particular font is used only inside of the About window of Xpdf. It will be replaced in there by a default font. The display of PDF documents is not affected at all by this. The solution will make the font settable via an Xresource. The same behaviour can be observed on Linux systems. But 3.02-9 fails to start with Floating point exception no matter what I try. Should I file a new bug on this? -- xpdf warnings Cannot convert string * to type FontStruct https://bugs.launchpad.net/bugs/447604 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 447604] Re: xpdf warnings Cannot convert string * to type FontStruct
Was missing gsfonts-x11. But even with both installed, I get the same error with 3.02-9, and it refuses to start. -- xpdf warnings Cannot convert string * to type FontStruct https://bugs.launchpad.net/bugs/447604 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 615382] [NEW] burning fails to reload tray
Public bug reported: Binary package hint: dvd+rw-tools On an up-to-date Lucid, genisoimage 9:1.1.10-1ubuntu1 with dvd+rw-tools 7.1-6 burns DVD-Rs fine, but exits with 1, because it cannot reload the tray: growisofs -quiet -dvd-compat -Z /dev/cdrw -dvd-video video/ Executing 'genisoimage -quiet -dvd-video video/ | builtin_dd of=/dev/cdrw obs=32k seek=0' /dev/cdrw: Current Write Speed is 20.5x1352KBps. builtin_dd: 2110912*2KB out @ average 13.0x1352KBps /dev/cdrw: flushing cache /dev/cdrw: updating RMA /dev/cdrw: closing disc :-( unable to reload tray: No such file or directory This hasn't always been this way. What causes this? How to fix it? ** Affects: dvd+rw-tools (Ubuntu) Importance: Undecided Status: New -- burning fails to reload tray https://bugs.launchpad.net/bugs/615382 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 615382] Re: burning fails to reload tray
I gave you the command I executed: $ growisofs -quiet -dvd-compat -Z /dev/cdrw -dvd-video video/ The output should have been an exit code of 0. It was an exit code of 1 with the above mentioned error. What more do you need? -- burning fails to reload tray https://bugs.launchpad.net/bugs/615382 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 447604] Re: xpdf warnings Cannot convert string * to type FontStruct
No, it's not. Not only does it still output 2 of those 4 messages: Warning: Cannot convert string -*-helvetica-medium-r-normal--12-*-*-*-*-*-iso8859-1 to type FontStruct Warning: Cannot convert string -*-courier-medium-r-normal--12-*-*-*-*-*-iso8859-1 to type FontStruct It also fails to start with a Floating point exception. ** Changed in: xpdf (Ubuntu) Status: Fix Released = New -- xpdf warnings Cannot convert string * to type FontStruct https://bugs.launchpad.net/bugs/447604 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 558384] Re: Settings dhcp in /etc/network/interfaces does not create /etc/resolv.conf
A me too here. This doesn't sound like a resolvconf bug, since Alvin said his /etc/resolv.conf is missing after boot. With the resolvconf-package installed, the file exists, but consists of the two resolvconf(8) comment lines. This seems to be an issue with DHCP on boot: IP address, gateway and the like are assigned fine, but nameserver is not. A fix would be appreciated. -- Settings dhcp in /etc/network/interfaces does not create /etc/resolv.conf https://bugs.launchpad.net/bugs/558384 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 566818] Re: [Lucid] cryptsetup passphrase prompt during boot: every character typed repeats the prompt
Contrary to Matt (#2), this happens also with quiet as boot option. So it seems to happen throughout Lucid with encrypted disks in /etc/crypttab and without splash screen. Did I mention this it quite annoying? :) ** Summary changed: - Ubuntu Server Encrypted LVM password prompt: every character typed repeats the prompt + [Lucid] cryptsetup passphrase prompt during boot: every character typed repeats the prompt -- [Lucid] cryptsetup passphrase prompt during boot: every character typed repeats the prompt https://bugs.launchpad.net/bugs/566818 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 574704] Re: munin-node after update to Lucid still in /etc/rc*.d, invoked twice
Thanks for the hint. Indeed, it's still started by upstart and removing /etc/rc?.d and /etc/init.d/munin-node has no effect on this. So there should probably be a postinst/postrm for at least /etc/rc?.d. -- munin-node after update to Lucid still in /etc/rc*.d, invoked twice https://bugs.launchpad.net/bugs/574704 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to munin in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 574704] Re: munin-node after update to Lucid still in /etc/rc*.d, invoked twice
Since I deleted the files by hand, I'm probably not suited to see if it works now. -- munin-node after update to Lucid still in /etc/rc*.d, invoked twice https://bugs.launchpad.net/bugs/574704 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to munin in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 574704] Re: munin-node after update to Lucid still in /etc/rc*.d, invoked twice
Thanks for the hint. Indeed, it's still started by upstart and removing /etc/rc?.d and /etc/init.d/munin-node has no effect on this. So there should probably be a postinst/postrm for at least /etc/rc?.d. -- munin-node after update to Lucid still in /etc/rc*.d, invoked twice https://bugs.launchpad.net/bugs/574704 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 574704] Re: munin-node after update to Lucid still in /etc/rc*.d, invoked twice
Since I deleted the files by hand, I'm probably not suited to see if it works now. -- munin-node after update to Lucid still in /etc/rc*.d, invoked twice https://bugs.launchpad.net/bugs/574704 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 574704] [NEW] munin-node after update to Lucid still in /etc/rc*.d, invoked twice
Public bug reported: Binary package hint: munin With system upgrade from Karmic to Lucid, munin-node was upgraded from 1.2.6-13ubuntu3 to 1.4.4-1ubuntu1. Now on boot, i get the following in /var/log/boot.log: Rather than invoking init scripts through /etc/init.d, use the service(8) utility, e.g. service S98munin-node start Since the script you are attempting to invoke has been converted to an Upstart job, you may also use the start(8) utility, e.g. start S98munin-node start: Unknown job: S98munin-node There is a /etc/init/munin-node.conf for invoking it via Upstart. There's also /etc/init.d/munin-node, a symlink to /lib/init/upstart-job. It seems the problem are these symlinks to /etc/init.d/munin-node: /etc/rc0.d/K20munin-node /etc/rc1.d/K20munin-node /etc/rc2.d/S98munin-node /etc/rc3.d/S98munin-node /etc/rc4.d/S98munin-node /etc/rc5.d/S98munin-node /etc/rc6.d/K20munin-node How to fix this error? Can I just delete the symlinks in /etc/rc*.d? Will upstart then still know to start it on boot? ** Affects: munin (Ubuntu) Importance: Undecided Status: New -- munin-node after update to Lucid still in /etc/rc*.d, invoked twice https://bugs.launchpad.net/bugs/574704 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to munin in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 574704] [NEW] munin-node after update to Lucid still in /etc/rc*.d, invoked twice
Public bug reported: Binary package hint: munin With system upgrade from Karmic to Lucid, munin-node was upgraded from 1.2.6-13ubuntu3 to 1.4.4-1ubuntu1. Now on boot, i get the following in /var/log/boot.log: Rather than invoking init scripts through /etc/init.d, use the service(8) utility, e.g. service S98munin-node start Since the script you are attempting to invoke has been converted to an Upstart job, you may also use the start(8) utility, e.g. start S98munin-node start: Unknown job: S98munin-node There is a /etc/init/munin-node.conf for invoking it via Upstart. There's also /etc/init.d/munin-node, a symlink to /lib/init/upstart-job. It seems the problem are these symlinks to /etc/init.d/munin-node: /etc/rc0.d/K20munin-node /etc/rc1.d/K20munin-node /etc/rc2.d/S98munin-node /etc/rc3.d/S98munin-node /etc/rc4.d/S98munin-node /etc/rc5.d/S98munin-node /etc/rc6.d/K20munin-node How to fix this error? Can I just delete the symlinks in /etc/rc*.d? Will upstart then still know to start it on boot? ** Affects: munin (Ubuntu) Importance: Undecided Status: New -- munin-node after update to Lucid still in /etc/rc*.d, invoked twice https://bugs.launchpad.net/bugs/574704 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 571932] Re: [i945]: Lucid startx looks for files in /usr/lib/dri/ - error
Thanks for the hint. Indeed xorg depends on it, but xserver-xorg-core and xserver-xorg only recommend it. That's why I didn't have it installed. ** Changed in: xserver-xorg-video-intel (Ubuntu) Status: Incomplete = Invalid -- [i945]: Lucid startx looks for files in /usr/lib/dri/ - error https://bugs.launchpad.net/bugs/571932 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 566818] Re: Ubuntu Server Encrypted LVM password prompt: every character typed repeats the prompt
I am also experiencing this on both my machines after upgrade to Lucid 10.04 Release. This is not only annoying, but I consider this a security bug: Now the amount of characters in the passphrase is echoed (with starts), before it was silent like sudo f.e. I would really like a fix for this. plymouth 0.8.2-2ubuntu2 cryptsetup 2:1.1.0~rc2-1ubuntu13 -- Ubuntu Server Encrypted LVM password prompt: every character typed repeats the prompt https://bugs.launchpad.net/bugs/566818 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 433926] Re: [karmic] xkbcomp error message
This is still present in Lucid Release :( -- [karmic] xkbcomp error message https://bugs.launchpad.net/bugs/433926 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 571932] [NEW] [i945]: Lucid startx looks for files in /usr/lib/dri/ - error
Public bug reported: Binary package hint: xserver-xorg-video-intel Freshly updated Lucid on a MSI Wind U100. 'startx' produces these errors on TTY and in /var/log/Xorg.0.log: (EE) AIGLX error: dlopen of /usr/lib/dri/i915_dri.so failed (/usr/lib/dri/i915_dri.so: cannot open shared object file: No such file or directory) (EE) AIGLX: reverting to software rendering (EE) AIGLX error: dlopen of /usr/lib/dri/swrast_dri.so failed (/usr/lib/dri/swrast_dri.so: cannot open shared object file: No such file or directory) (EE) GLX: could not load software renderer xserver-xorg-video-intel 2:2.9.1-3ubuntu5 xserver-xorg 1:7.5+5ubuntu1 $ lspci | grep VGA 00:02.0 VGA compatible controller: Intel Corporation Mobile 945GME Express Integrated Graphics Controller (rev 03) ** Affects: xserver-xorg-video-intel (Ubuntu) Importance: Undecided Status: New -- [i945]: Lucid startx looks for files in /usr/lib/dri/ - error https://bugs.launchpad.net/bugs/571932 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 567913] Re: No audio in wmv-files: Cannot find codec for audio format 0x161
Any updates on shortly? Also, shouldn't #567913 and #567682 be dupes of #567159? :) -- No audio in wmv-files: Cannot find codec for audio format 0x161 https://bugs.launchpad.net/bugs/567913 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 567159] [NEW] libavcodec52 4:0.5+svn20090706-2ubuntu2.1 regression: audio codec families not available
Public bug reported: Binary package hint: mplayer Ubuntu Security Notice USN-931-1 updated libavcodec52 from 4:0.5+svn20090706-2ubuntu2 to 4:0.5+svn20090706-2ubuntu2.1 on Ubuntu 9.10: http://www.ubuntu.com/usn/USN-931-1 This update breaks support for some audio codec families, f.e. afm=dmo and afm=acm no longer work. Attached is a diff from mplayer output of the same file, once with ~2ubuntu2, once with ~2ubuntu2.1. ** Affects: mplayer (Ubuntu) Importance: Undecided Status: New -- libavcodec52 4:0.5+svn20090706-2ubuntu2.1 regression: audio codec families not available https://bugs.launchpad.net/bugs/567159 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 567159] Re: libavcodec52 4:0.5+svn20090706-2ubuntu2.1 regression: audio codec families not available
** Attachment added: libavcodec52.diff http://launchpadlibrarian.net/44884578/libavcodec52.diff -- libavcodec52 4:0.5+svn20090706-2ubuntu2.1 regression: audio codec families not available https://bugs.launchpad.net/bugs/567159 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 433926] Re: [karmic] xkbcomp error message
Euh, this bug is still present in my up-to-date Karmic. And my /usr/share/X11/xkb/symbols/level3 still has the same timestamp as reported above. It also seems it's not fixed upstream yet. I can't run a Lucid Beta right now. But I am wondering: should bugs really be closed because of no response? That feels kind of rude. What should I have responded? Btw, I have neither xkeyboard-config nor xkbcomp installed. ** Changed in: xkeyboard-config (Ubuntu) Status: Invalid = New -- [karmic] xkbcomp error message https://bugs.launchpad.net/bugs/433926 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 361510] Re: [Jaunty] PolicyKit: no active session in X - no ACLs for sound card
Ahem, the correct solution is of course: $ sudo adduser user audio -- [Jaunty] PolicyKit: no active session in X - no ACLs for sound card https://bugs.launchpad.net/bugs/361510 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 493203] [NEW] libwww-perl 5.831-1: Transfer truncated - fixed in newer Debian package
Public bug reported: Binary package hint: libwww-perl On up-to-date Karmic, libwww-perl 5.831-1 throws out this Bug http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=548417 at perl -MCPAN -e 'install FOO': Transfer truncated: only out of BAR bytes received Installing current libwww-perl 5.834-1 from the Debian Sid repo fixed it. The other reports suggest, this was already fixed in 5.812-1. So please update the package in Karmic repo. Thanks :) ** Affects: libwww-perl (Ubuntu) Importance: Undecided Status: New -- libwww-perl 5.831-1: Transfer truncated - fixed in newer Debian package https://bugs.launchpad.net/bugs/493203 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 464500] [NEW] When polipo is not running the cron.daily script exits with anon-zero return value
Public bug reported: Binary package hint: polipo Polipo (1.0.4-1.1), same as upstream where the bug also occurs: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=549981 The non-zero return value leads to cron sending out mails, which is not really necessary and annoying. Adding echo exit 0 /etc/cron.daily/polipo as suggested upstream doesn't work. ** Affects: polipo (Ubuntu) Importance: Undecided Status: New -- When polipo is not running the cron.daily script exits with anon-zero return value https://bugs.launchpad.net/bugs/464500 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs