[Bug 1573485] [NEW] Provide Tor Hidden Service for archive.ubuntu.com

2016-04-22 Thread ilf
Public bug reported:

Debian now has mirrors as Tor Hidden Services:
http://richardhartmann.de/blog/posts/2015/08/24-Tor-enabled_Debian_mirror/
http://richardhartmann.de/blog/posts/2015/08/25-Tor-enabled_Debian_mirror_part_2/

This would be great for Ubuntu, too.

Description: https://www.torproject.org/docs/hidden-services.html.en
Howto: https://www.torproject.org/docs/tor-hidden-service.html.en

Thanks

** Affects: ubuntu
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1573485

Title:
  Provide Tor Hidden Service for archive.ubuntu.com

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/1573485/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215361] [NEW] Please update to 29.0.1547.57

2013-08-22 Thread ilf
*** This bug is a security vulnerability ***

Public security bug reported:

And again a new stable release with lots of security fixes:
http://googlechromereleases.blogspot.com/2013/08/stable-channel-
update.html

Here are the CVEs:

CVE-2013-2887: Various fixes from internal audits, fuzzing and other 
initiatives (Chrome 29).
CVE-2013-2900: Incomplete path sanitization in file handling.
CVE-2013-2901: Integer overflow in ANGLE.
CVE-2013-2902: Use after free in XSLT.
CVE-2013-2903: Use after free in media element.
CVE-2013-2904: Use after free in document parsing.
CVE-2013-2905: Information leak via overly broad permissions on shared memory 
files.

(I should write a script for this.)

** Affects: chromium-browser (Ubuntu)
 Importance: Undecided
 Status: New

** Information type changed from Private Security to Public Security

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2887

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2900

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2901

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2902

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2903

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2904

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2905

** Description changed:

  And again a new stable release with lots of security fixes:
- googlechromereleases.blogspot.com/2013/08/stable-channel-update.html
+ http://googlechromereleases.blogspot.com/2013/08/stable-channel-
+ update.html
  
  Here are the CVEs:
  
  CVE-2013-2887: Various fixes from internal audits, fuzzing and other 
initiatives (Chrome 29).
  CVE-2013-2900: Incomplete path sanitization in file handling.
- CVE-2013-2901: Integer overflow in ANGLE. 
- CVE-2013-2902: Use after free in XSLT. 
- CVE-2013-2903: Use after free in media element. 
- CVE-2013-2904: Use after free in document parsing. 
+ CVE-2013-2901: Integer overflow in ANGLE.
+ CVE-2013-2902: Use after free in XSLT.
+ CVE-2013-2903: Use after free in media element.
+ CVE-2013-2904: Use after free in document parsing.
  CVE-2013-2905: Information leak via overly broad permissions on shared memory 
files.
  
  (I should write a script for this.)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215361

Title:
  Please update to 29.0.1547.57

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1215361/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1207019] [NEW] Please update to 28.0.1500.95

2013-07-31 Thread ilf
*** This bug is a security vulnerability ***

Public security bug reported:

And again a new stable release with lots of security fixes:
http://googlechromereleases.blogspot.com/2013/07/stable-channel-
update_30.html

Here are some CVEs:

CVE-2013-2881: Origin bypass in frame handling. 
CVE-2013-2882: Type confusion in V8. 
CVE-2013-2883: Use-after-free in MutationObserver. 
CVE-2013-2884: Use-after-free in DOM. 
CVE-2013-2885: Use-after-free in input handling. 
CVE-2013-2886: Various fixes from internal audits, fuzzing and other 
initiatives.

** Affects: chromium-browser (Ubuntu)
 Importance: Undecided
 Status: New

** Information type changed from Private Security to Public Security

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2881

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2882

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2883

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2884

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2885

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2886

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1207019

Title:
  Please update to 28.0.1500.95

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1207019/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1207019] Re: Please update to 28.0.1500.95

2013-07-31 Thread ilf
And Debians package: http://packages.qa.debian.org/c/chromium-
browser/news/20130731T071212Z.html

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1207019

Title:
  Please update to 28.0.1500.95

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1207019/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1199644] [NEW] Please update to 28.0.1500.71

2013-07-10 Thread ilf
*** This bug is a security vulnerability ***

Public security bug reported:

And again a new stable release with lots of security fixes:
http://googlechromereleases.blogspot.com/2013/07/stable-channel-
update.html

Here are the CVEs:

CVE-2013-2853: Man-in-the-middle attack against HTTP in SSL.
CVE-2013-2867: Block pop-unders in various scenarios. 
CVE-2013-2868: Incorrect sync of NPAPI extension component. 
CVE-2013-2869: Out-of-bounds read in JPEG2000 handling. 
CVE-2013-2870: Use-after-free with network sockets. 
CVE-2013-2871: Use-after-free in input handling.
CVE-2013-2872: Possible lack of entropy in renderers.
CVE-2013-2873: Use-after-free in resource loading.
CVE-2013-2874: Screen data leak with GL textures.
CVE-2013-2875: Out-of-bounds-read in SVG.
CVE-2013-2876: Extensions permissions confusion with interstitials.
CVE-2013-2877: Out-of-bounds read in XML parsing.
CVE-2013-2878: Out-of-bounds read in text handling.
CVE-2013-2879: Confusion setting up sign-in and sync.

** Affects: chromium-browser (Ubuntu)
 Importance: Undecided
 Status: New

** Information type changed from Private Security to Public Security

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2853

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2867

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2868

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2869

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2870

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2871

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2872

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2873

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2874

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2875

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2876

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2877

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2878

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2879

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1199644

Title:
  Please update to 28.0.1500.71

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1199644/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1183086] Re: Please update to 27.0.1453.110

2013-06-10 Thread ilf
lol, even Debian Stable managed to do this: http://lists.debian.org
/debian-security-announce/2013/msg00114.html

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1183086

Title:
  Please update to 27.0.1453.110

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1183086/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1183086] Re: Please update to 27.0.1453.93

2013-06-05 Thread ilf
And 27.0.1453.110: http://googlechromereleases.blogspot.com/2013/06
/stable-channel-update.html

CVE-2013-2854: Bad handle passed to renderer. 
CVE-2013-2855: Memory corruption in dev tools API. 
CVE-2013-2856: Use-after-free in input handling. 
CVE-2013-2857: Use-after-free in image handling. 
CVE-2013-2858: Use-after-free in HTML5 Audio. 
CVE-2013-2859: Cross-origin namespace pollution. 
CVE-2013-2860: Use-after-free with workers accessing database APIs. 
CVE-2013-2861: Use-after-free with SVG. 
CVE-2013-2862: Memory corruption in Skia GPU handling. 
CVE-2013-2863: Memory corruption in SSL socket handling. 
CVE-2013-2864: Bad free in PDF viewer. 
CVE-2013-2865: Various fixes from internal audits, fuzzing and other 
initiatives.

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2854

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2855

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2856

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2857

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2858

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2859

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2860

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2861

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2862

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2863

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2864

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2865

** Summary changed:

- Please update to 27.0.1453.93
+ Please update to 27.0.1453.110

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1183086

Title:
  Please update to 27.0.1453.110

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1183086/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1184866] Re: Realtek RT2700E: no more wifi in raring

2013-06-05 Thread ilf
OK, I tried both 3.10.0-031000rc4 from the PPa and 3.5.0-27 from
Quantal. Same problem.

If it's not the kernel, which component is it?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1184866

Title:
  Realtek RT2700E: no more wifi in raring

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1184866/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1184866] [NEW] Realtek RT2700E: no more wifi in raring

2013-05-28 Thread ilf
Public bug reported:

I have been using Ubuntu on my MSI Wind 100 since at least Lucid. The
wifi card Realtek RT2700E always worked, no more on Raring.

% lspci | grep -i tek
01:00.0 Ethernet controller: Realtek Semiconductor Co., Ltd. RTL8101E/RTL8102E 
PCI Express Fast Ethernet controller (rev 02)

% sudo ifconfig wlan0 up

% iwlist wlan0 scan 

wlan0 No scan results

% sudo grep wlan0 /var/log/kern.log
May 28 09:17:26 molly kernel: [  130.836462] IPv6: ADDRCONF(NETDEV_UP): wlan0: 
link is not ready

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Incomplete


** Tags: raring

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1184866

Title:
  Realtek RT2700E: no more wifi in raring

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1184866/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1184866] Re: Realtek RT2700E: no more wifi in raring

2013-05-28 Thread ilf
Please tell me which log files suspecut the error to be in and I will gladly 
provide these parts.
But I will not allow a script to upload my /var/log to public places.

** Changed in: linux (Ubuntu)
   Status: Incomplete = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1184866

Title:
  Realtek RT2700E: no more wifi in raring

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1184866/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1183086] [NEW] Please update to 27.0.1453.93

2013-05-22 Thread ilf
*** This bug is a security vulnerability ***

Public security bug reported:

And again a new stable release with lots of security fixes:
http://googlechromereleases.blogspot.de/2013/05/stable-channel-
release.html

Here are the CVEs:

CVE-2013-2837: Use-after-free in SVG.
CVE-2013-2838: Out-of-bounds read in v8.
CVE-2013-2839: Bad cast in clipboard handling.
CVE-2013-2840: Use-after-free in media loader.
CVE-2013-2841: Use-after-free in Pepper resource handling.
CVE-2013-2842: Use-after-free in widget handling.
CVE-2013-2843: Use-after-free in speech handling.
CVE-2013-2844: Use-after-free in style resolution.
CVE-2013-2845: Memory safety issues in Web Audio.
CVE-2013-2846: Use-after-free in media loader.
CVE-2013-2847: Use-after-free race condition with workers.
CVE-2013-2848: Possible data extraction with XSS Auditor.
CVE-2013-2849: Possible XSS with drag+drop or copy+paste.

Please update and keep current. Thanks.

** Affects: chromium-browser (Ubuntu)
 Importance: Undecided
 Status: New

** Information type changed from Private Security to Public Security

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2837

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2838

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2839

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2840

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2841

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2842

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2843

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2844

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2847

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2848

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2845

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2846

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2849

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1183086

Title:
  Please update to 27.0.1453.93

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1183086/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1161296] Re: Please update to 26.0.1410.63

2013-04-09 Thread ilf
Now it's 26.0.1410.63: http://googlechromereleases.blogspot.de/2013/04
/stable-channel-update.html

This release contains stability improvements, and a new version of Adobe
Flash: http://helpx.adobe.com/en/flash-player/release-
note/fp_117_air_37_release_notes.html

** Summary changed:

- Please update to 26.0.1410.43
+ Please update to 26.0.1410.63

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1161296

Title:
  Please update to 26.0.1410.63

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1161296/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1161296] [NEW] Please update to 26.0.1410.43

2013-03-28 Thread ilf
*** This bug is a security vulnerability ***

Public security bug reported:

And again a new stable release with lots of security fixes:
http://googlechromereleases.blogspot.de/2013/03/stable-channel-
update_26.html

Here are the CVEs:

[$1000] [172342] High CVE-2013-0916: Use-after-free in Web Audio. Credit to 
Atte Kettunen of OUSPG.
[180909] Low CVE-2013-0917: Out-of-bounds read in URL loader. Credit to Google 
Chrome Security Team (Cris Neckar).
[180555] Low CVE-2013-0918: Do not navigate dev tools upon drag and drop. 
Credit to Vsevolod Vlasov of the Chromium development community.
[Linux only] [178760] Medium CVE-2013-0919: Use-after-free with pop-up windows 
in extensions. Credit to Google Chrome Security Team (Mustafa Emre Acer).
[177410] Medium CVE-2013-0920: Use-after-free in extension bookmarks API. 
Credit to Google Chrome Security Team (Mustafa Emre Acer).
[174943] High CVE-2013-0921: Ensure isolated web sites run in their own 
processes.
[174129] Low CVE-2013-0922: Avoid HTTP basic auth brute force attempts. Credit 
to “t3553r”.
[169981] [169972] [169765] Medium CVE-2013-0923: Memory safety issues in the 
USB Apps API. Credit to Google Chrome Security Team (Mustafa Emre Acer).
[169632] Low CVE-2013-0924: Check an extension’s permissions API usage again 
file permissions. Credit to Benjamin Kalman of the Chromium development 
community.
[168442] Low CVE-2013-0925: Avoid leaking URLs to extensions without the tabs 
permissions. Credit to Michael Vrable of Google.
[112325] Medium CVE-2013-0926: Avoid pasting active tags in certain situations. 
Credit to Subho Halder, Aditya Gupta, and Dev Kar of xys3c (xysec.com).

** Affects: chromium-browser (Ubuntu)
 Importance: Undecided
 Status: New

** Information type changed from Private Security to Public Security

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0916

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0917

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0918

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0919

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0920

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0921

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0922

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0923

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0924

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0925

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0926

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1161296

Title:
  Please update to 26.0.1410.43

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1161296/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1154460] [NEW] new upstream release: 25.0.1364.172

2013-03-13 Thread ilf
*** This bug is a security vulnerability ***

Public security bug reported:

And again a new stable release: 
http://googlechromereleases.blogspot.de/2013/03/stable-channel-update_12.html
Comes with a new Flash: 
https://www.adobe.com/support/security/bulletins/apsb13-09.html

Here are the CVEs:

- These updates resolve an integer overflow vulnerability that could lead to 
code execution (CVE-2013-0646).
- These updates resolve a use-after-free vulnerability that could be exploited 
to execute arbitrary code (CVE-2013-0650).
- These updates resolve a memory corruption vulnerability that could lead to 
code execution (CVE-2013-1371).
- These updates resolve a heap buffer overflow vulnerability that could lead to 
code execution (CVE-2013-1375).

** Affects: chromium-browser (Ubuntu)
 Importance: Undecided
 Status: New

** Information type changed from Private Security to Public Security

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0646

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0650

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-1371

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-1375

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1154460

Title:
  new upstream release: 25.0.1364.172

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1154460/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1132568] Re: Please update to 25.0.1364.97

2013-03-04 Thread ilf
When will syncing be possible again?

Here are the CVE references:

CVE-2013-0900: Race condition in ICU. Credit to Google Chrome Security Team 
(Inferno).
CVE-2013-0899: Integer overflow in Opus handling. Credit to Google Chrome 
Security Team (Jüri Aedla).
CVE-2013-0898: Use-after-free in URL handling. Credit to Alexander Potapenko of 
the Chromium development community.
CVE-2013-0897: Off-by-one read in PDF. Credit to Mateusz Jurczyk, with 
contributions by Gynvael Coldwind, both from Google Security Team.
CVE-2013-0896: Memory management issues in plug-in message handling. Credit to 
Google Chrome Security Team (Cris Neckar).
CVE-2013-0895: Incorrect path handling in file copying. Credit to Google Chrome 
Security Team (Jüri Aedla).
CVE-2013-0894: Buffer overflow in vorbis decoding. Credit to Google Chrome 
Security Team (Inferno).
CVE-2013-0893: Race condition in media handling. Credit to Andrew Scherkus of 
the Chromium development community.
CVE-2013-0892: Lower severity issues across the IPC layer. Credit to Google 
Chrome Security Team (Chris Evans).
CVE-2013-0891: Integer overflow in blob handling. Credit to Google Chrome 
Security Team (Jüri Aedla).
CVE-2013-0890: Memory safety issues across the IPC layer. Credit to Google 
Chrome Security Team (Chris Evans).
CVE-2013-0889: Tighten user gesture check for dangerous file downloads.
CVE-2013-0888: Out-of-bounds read in Skia. Credit to Google Chrome Security 
Team (Inferno).
CVE-2013-0887: Developer tools process has too many permissions and places too 
much trust in the connected server.
CVE-2013-0886: Incorrect NaCl signal handling. Credit to Mark Seaborn of the 
Chromium development community.
CVE-2013-0885: Too many API permissions granted to web store.
CVE-2013-0884: Inappropriate load of NaCl. Credit to Google Chrome Security 
Team (Chris Evans).
CVE-2013-0883: Bad read in Skia. Credit to Atte Kettunen of OUSPG.
CVE-2013-0882: Bad memory access with excessive SVG parameters. Credit to 
Renata Hodovan.
CVE-2013-0881: Bad read in Matroska handling. Credit to Atte Kettunen of OUSPG. 
CVE-2013-0880: Use-after-free in database handling. Credit to Chamal de Silva.
CVE-2013-0879: Memory corruption with web audio node. Credit to Atte Kettunen 
of OUSPG.

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0879

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0880

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0881

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0882

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0883

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0884

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0885

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0886

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0887

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0888

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0889

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0890

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0891

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0892

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0893

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0894

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0895

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0896

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0897

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0898

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0899

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0900

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1132568

Title:
  Please update to 25.0.1364.97

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1132568/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1132568] Re: Please update to 25.0.1364.152

2013-03-04 Thread ilf
And another release: http://googlechromereleases.blogspot.de/2013/03
/stable-channel-update_4.html

The new CVEs:

[$1000] [176882] High CVE-2013-0902: Use-after-free in frame loader. Credit 
to Chamal de Silva.
[$1000] [176252] High CVE-2013-0903: Use-after-free in browser navigation 
handling. Credit to “chromium.khalil”.
[$2000] [172926] [172331] High CVE-2013-0904: Memory corruption in Web 
Audio. Credit to Atte Kettunen of OUSPG.
[$1000] [168982] High CVE-2013-0905: Use-after-free with SVG animations. 
Credit to Atte Kettunen of OUSPG.
[174895] High CVE-2013-0906: Memory corruption in Indexed DB. Credit to 
Google Chrome Security Team (Jüri Aedla).
[174150] Medium CVE-2013-0907: Race condition in media thread handling. 
Credit to Andrew Scherkus of the Chromium development community.
[174059] Medium CVE-2013-0908: Incorrect handling of bindings for extension 
processes.
[173906] Low CVE-2013-0909: Referer leakage with XSS Auditor. Credit to 
Egor Homakov.
[172573] Medium CVE-2013-0910: Mediate renderer - browser plug-in loads 
more strictly. Credit to Google Chrome Security Team (Chris Evans).
[172264] High CVE-2013-0911: Possible path traversal in database handling. 
Credit to Google Chrome Security Team (Jüri Aedla).

** Summary changed:

- Please update to 25.0.1364.97
+ Please update to 25.0.1364.152

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0902

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0903

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0904

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0905

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0906

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0907

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0908

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0909

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0910

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0911

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1132568

Title:
  Please update to 25.0.1364.152

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1132568/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1099075] Re: new upstream release: 24.0.1312.56

2013-01-22 Thread ilf
And again: 24.0.1312.56

Security fixes:

* [$1000] [151008] High CVE-2013-0839: Use-after-free in canvas font handling. 
Credit to Atte Kettunen of OUSPG.
* [170532] Medium CVE-2013-0840: Missing URL validation when opening new 
windows.
* [169770] High CVE-2013-0841: Unchecked array index in content blocking. 
Credit to Google Chrome Security Team (Chris Evans).
* [166867] Medium CVE-2013-0842: Problems with NULL characters embedded in 
paths. Credit to Google Chrome Security Team (Jüri Aedla).
* [Mac only] [166523] High CVE-2013-0843: Crash with unsupported RTC sampling 
rate. Credit to Ted Nakamura of the Chromium development community.

I don't know why you edited this out of my original description:

From a security perspective, having no Chromium package at all would be
better than having outdated ones with gaping holes.

** Summary changed:

- new upstream release: 24.0.1312.52
+ new upstream release: 24.0.1312.56

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0839

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0840

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0841

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0842

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0843

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1099075

Title:
  new upstream release: 24.0.1312.56

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1099075/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1101843] [NEW] new upstream release: 18.0.1

2013-01-19 Thread ilf
Public bug reported:

Changelog: https://www.mozilla.org/en-
US/firefox/18.0.1/releasenotes/buglist.html

** Affects: firefox (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1101843

Title:
  new upstream release: 18.0.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/firefox/+bug/1101843/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1101843] Re: new upstream release: 18.0.1

2013-01-19 Thread ilf
Care to explain the relevance of a weekday for software upgrades?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1101843

Title:
  new upstream release: 18.0.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/firefox/+bug/1101843/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1099075] [NEW] new upstream release: 24.0.1312.52

2013-01-13 Thread ilf
*** This bug is a security vulnerability ***

Public security bug reported:

And again a new stable release: 24.0.1312.52.
As always, it comes with *lots* of security fixes 
(http://googlechromereleases.blogspot.de/2013/01/stable-channel-update.html), 
including a Flash update 
(http://helpx.adobe.com/en/flash-player/release-note/fp_115_air_35_release_notes.html)

Please update the Ubuntu package to the newest version and keep it
current, as you do with Firefox.

From a security perspective, having no Chromium package at all would be
better than having outdated ones with gaping holes.

** Affects: chromium-browser (Ubuntu)
 Importance: Undecided
 Status: New

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1099075

Title:
  new upstream release: 24.0.1312.52

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1099075/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1086613] Re: Please update to 23.0.1271.97

2013-01-13 Thread ilf
Ok, here's the new one: #1099075

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1086613

Title:
  Please update to 23.0.1271.97

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1086613/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1086613] Re: Please update to 24.0.1312.52

2013-01-11 Thread ilf
And again a new stable release: 24.0.1312.52.
As always, it comes with *lots* of security fixes 
(http://googlechromereleases.blogspot.de/2013/01/stable-channel-update.html), 
including a Flash update 
(http://helpx.adobe.com/en/flash-player/release-note/fp_115_air_35_release_notes.html)

Please update the Ubuntu package to the newest version and keep it
current, as you do with Firefox.

From a security perspective, having no Chromium package at all would be
better than having outdated ones with gaping holes.

** Summary changed:

- Please update to 23.0.1271.97
+ Please update to 24.0.1312.52

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1086613

Title:
  Please update to 24.0.1312.52

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1086613/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 824961] Re: Ubuntu 11.04 Server with encrypted LVM on dm RAID0 -- Incorrect metadata area header checksum - No volume groups found - ALERT! /dev/mapper/MachineName-root does not exist

2012-11-01 Thread ilf
I got exactly the same behavior as #11.  Maybe we sould file a new bug,
since the rest works?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/824961

Title:
  Ubuntu 11.04 Server with encrypted LVM on dm RAID0 -- Incorrect
  metadata area header checksum - No volume groups found - ALERT!
  /dev/mapper/MachineName-root does not exist

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/824961/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 925760] Re: Constant warnings from the kernel: Test WP failed, assume Write Enabled

2012-10-25 Thread ilf
Just blacklist the module in /etc/modprobe.d/blacklist.conf

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/925760

Title:
  Constant warnings from the kernel: Test WP failed, assume Write
  Enabled

To manage notifications about this bug go to:
https://bugs.launchpad.net/linux/+bug/925760/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 992068] Re: broken in 12.04: libtorsocks: many symbols not found

2012-10-21 Thread ilf
This is still present in torsocks 1.2-3 amd64 in Quantal release.

It's especially annoying, since this has been fixed in Debians 1.2-3,
but Ubuntu 1.2-3 ships with a different /usr/lib/torsocks/libtorsocks.a
and /usr/lib/torsocks/libtorsocks.so.1.0.0 than Debian.

** Summary changed:

- broken in 12.04: libtorsocks: many symbols not found
+ broken in 12.04 and 12.10: libtorsocks: many symbols not found

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/992068

Title:
  broken in 12.04 and 12.10: libtorsocks: many symbols not found

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/torsocks/+bug/992068/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 992068] Re: broken in 12.04 and 12.10: libtorsocks: many symbols not found

2012-10-21 Thread ilf
And apt thinks the 1.2-3 from Ubuntu is more current than the 1.2-3 from
Debian. So working around this needs apt-pinning :(

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/992068

Title:
  broken in 12.04 and 12.10: libtorsocks: many symbols not found

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/torsocks/+bug/992068/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1004983] Re: X.org segfaults when exiting window manager

2012-07-09 Thread ilf
I can confirm 2:1.11.4-0ubuntu10.3 fixed it. Thanks!
A little report-back would've been nice :)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1004983

Title:
  X.org segfaults when exiting window manager

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1004983/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1004983] Re: X.org segfaults when exiting window manager

2012-06-09 Thread ilf
Siep: After X.org segfaults, switching TTYs doesn't work any more.
Also, I don't want to shut down my system when exiting X.org. And I want to 
restart X.org later.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1004983

Title:
  X.org segfaults when exiting window manager

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1004983/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 925760] Re: Constant warnings from the kernel: Test WP failed, assume Write Enabled

2012-06-08 Thread ilf
Same here, anything you need for it to progress?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/925760

Title:
  Constant warnings from the kernel: Test WP failed, assume Write
  Enabled

To manage notifications about this bug go to:
https://bugs.launchpad.net/linux/+bug/925760/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1004983] Re: X.org segfaults when exiting window manager

2012-06-08 Thread ilf
Anything you need for this? This is highly annoying and should be
treated with high priority, being a regression.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1004983

Title:
  X.org segfaults when exiting window manager

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1004983/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 778659] Re: boot cryptsetup passphrase prompt echoes typed characters as stars

2012-06-08 Thread ilf
What's the holdup here? Do you not think this is a bug?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/778659

Title:
  boot cryptsetup passphrase prompt echoes typed characters as stars

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/778659/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1004983] Re: X.org segfaults when exiting window manager

2012-05-28 Thread ilf
Oh, and on the other box, I first tried it with xserver-(xorg-core|common) 
1.11.4-0ubuntu10.1, where this bug didn't kick in.
Then upgraded to 1.11.4-0ubuntu10.2, and it arrived.

So, this probably qualifies as Importance High, since it's a regression.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1004983

Title:
  X.org segfaults when exiting window manager

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1004983/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1004983] Re: X.org segfaults when exiting window manager

2012-05-28 Thread ilf
Reproduced this on another box.

** Attachment added: Xorg.0.log
   
https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1004983/+attachment/3167015/+files/Xorg.0.log

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1004983

Title:
  X.org segfaults when exiting window manager

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1004983/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1004983] Re: Current Precise: TTY freezes, DVI stops working

2012-05-27 Thread ilf
Got it. It's xserver-(xorg-core|common), starting with the upgrade from
1.11.4-0ubuntu10.1 to 1.11.4-0ubuntu10.2.

I start X with xinit and an xinitrc like attached.
When quitting my window manager, X.org segaults.

/var/log/syslog sais:

[ 8107.274733] Xorg[2365]: segfault at c0 ip 7fc6070a6558 sp 
7f878570 error 4 in Xorg[7fc607051000+1f]
[ 8108.143659] init: tty1 main process ended, respawning


** Attachment added: xinitrc
   
https://bugs.launchpad.net/ubuntu/+bug/1004983/+attachment/3165564/+files/xinitrc

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1004983

Title:
  X.org segfaults when exiting window manager

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1004983/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1004983] Re: Current Precise: TTY freezes, DVI stops working

2012-05-27 Thread ilf
Segmentation fault at address 0xc0
Caught signal 11 (Segmentation fault). Server aborting

** Attachment added: Xorg.0.log
   
https://bugs.launchpad.net/ubuntu/+bug/1004983/+attachment/3165565/+files/Xorg.0.log

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1004983

Title:
  X.org segfaults when exiting window manager

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1004983/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1004983] Re: Current Precise: TTY freezes, DVI stops working

2012-05-27 Thread ilf
Segmentation fault at address 0xc0
Caught signal 11 (Segmentation fault). Server aborting

** Attachment added: Xorg.0.log.old
   
https://bugs.launchpad.net/ubuntu/+bug/1004983/+attachment/3165566/+files/Xorg.0.log.old

** Package changed: ubuntu = xorg-server (Ubuntu)

** Summary changed:

- Current Precise: TTY freezes, DVI stops working
+ X.org segfaults when exiting window manager

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1004983

Title:
  X.org segfaults when exiting window manager

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1004983/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1005117] Re: Xorg segfaults when closing, leaving system unresonsive

2012-05-27 Thread ilf
*** This bug is a duplicate of bug 1004983 ***
https://bugs.launchpad.net/bugs/1004983

** This bug has been marked a duplicate of bug 1004983
   X.org segfaults when exiting window manager

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1005117

Title:
  Xorg segfaults when closing, leaving system unresonsive

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1005117/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1004983] [NEW] Current Precise: TTY freezes, DVI stops working

2012-05-26 Thread ilf
Public bug reported:

I've been running up-to-date stable for a few releases. Since a few days
my system freezes. Maybe it's been since installing and booting into
linux-image-3.2.0-24-generic, but I'm not sure.

When I leave, I exit X.org, drop into TTY1 and log out there.
When returning, my monitor won't find a DVI signal any mroe. Plugging DVI out 
and back in returns video output, but the boot log screen. I am unable to 
switch between TTYs or log in.
SSH still works and everything seems to run fine.
But without being able to log in locally, I have no chance but to reboot.

This is highly annoying, and really new. I don't want to post all my
logs, any idea where to look?

** Affects: ubuntu
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1004983

Title:
  Current Precise: TTY freezes, DVI stops working

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/1004983/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 876626] Re: Unlocking the second crypto disk (/home) echos password on console

2012-04-24 Thread ilf
Thanks for finally looking into this.

While on this, please also look at #778659.
I do not agree with Comment #33 that [obscuring] the entered passphrase and 
[displaying] asterisks is correct. It should not display any input, as 
cryptsetup(8), cryptdisks_start(8), passwd(1), gpg(1) and all others do.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/876626

Title:
  Unlocking the second crypto disk (/home) echos password on console

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/876626/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 876626] Re: Unlocking the second crypto disk (/home) echos password on console

2012-04-20 Thread ilf
Note to self: Encryption of data volumes on a headless system is a
corner case.




Ubuntu is designed with security in mind. https://wiki.ubuntu.com/LTS

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/876626

Title:
  Unlocking the second crypto disk (/home) echos password on console

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/876626/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 876626] Re: Unlocking the second crypto disk (/home) echos password on console

2012-04-19 Thread ilf
Are you shitting me? Half a year and one release later, you're delaying
this again? You're shipping this on a production LTS?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/876626

Title:
  Unlocking the second crypto disk (/home) echos password on console

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/876626/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 876626] Re: Unlocking the second crypto disk (/home) echos password on console

2012-04-08 Thread ilf
Still present in current Beta 2, three days until FinalFreeze. Way to go
for LTS!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/876626

Title:
  Unlocking the second crypto disk (/home) echos password on console

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/876626/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 876626] Re: Unlocking the second crypto disk (/home) echos password on console

2012-02-08 Thread ilf
Yeah, it's not like this should be a priority, so taking four months
without progress is completely ok.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/876626

Title:
  Unlocking the second crypto disk (/home) echos password on console

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/876626/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 876626] Re: Unlocking the second crypto disk (/home) echos password on console

2012-02-08 Thread ilf
@Benjamin: I am grateful for general FLOSS development, but I am totally
pissed at the way Ubuntu is handling passphrase input for crypto disks
at boot.

It started almost two years ago with bug 566818.
Then it became a security issue last year with bug 778659.
Now this on has been idling for four months.

I would be able to look over this, if there were clear responsibilities
and a working process, fixing it in a reasonable time frame.

But it's Importance: Undecided for plymouth and Oneiric?
It's only assigned to someone in Precise upstart, too?
Why has the assignee not commented here once?
If plymouth may be responsible, has upstream been contacted? (Nothing in their 
Bugtracker).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/876626

Title:
  Unlocking the second crypto disk (/home) echos password on console

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/876626/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 880348] Re: boot cryptsetup passphrase prompt displays passphrase in clear text

2011-11-05 Thread ilf
*** This bug is a duplicate of bug 876626 ***
https://bugs.launchpad.net/bugs/876626

** This bug is no longer a duplicate of bug 877403
   crypttab LUKS password shown in cleartext
** This bug has been marked a duplicate of bug 876626
   Unlocking the second crypto disk (/home) echos password on console

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/880348

Title:
  boot cryptsetup passphrase prompt displays passphrase in clear text

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/880348/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 877403] Re: crypttab LUKS password shown in cleartext

2011-11-05 Thread ilf
*** This bug is a duplicate of bug 876626 ***
https://bugs.launchpad.net/bugs/876626

** This bug has been marked a duplicate of bug 876626
   Unlocking the second crypto disk (/home) echos password on console

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/877403

Title:
  crypttab LUKS password shown in cleartext

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/upstart/+bug/877403/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 839595] Re: failsafe.conf's 30 second time out is too low

2011-10-23 Thread ilf
The workaround only fixes the waiting time.
It disables auto-up of the interface, which I want, if it us plugged in. This 
is a regression and still a major annoyance for me.
Closing this bug report is not right, this isn't the fault of ifupdown, but 
upstart.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/839595

Title:
  failsafe.conf's 30 second time out is too low

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/839595/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 878815] Re: mplayer: Symbol `ff_codec_bmp_tags' has different size in shared object, consider re-linking

2011-10-23 Thread ilf
This is an mplayer package problem, not a Medibuntu problem.
oneiric-staging seems to be Medibuntu only.

** Project changed: medibuntu = mplayer (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/878815

Title:
  mplayer: Symbol `ff_codec_bmp_tags' has different size in shared
  object, consider re-linking

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mplayer/+bug/878815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 880348] [NEW] boot cryptsetup passphrase prompt displays passphrase in clear text

2011-10-23 Thread ilf
*** This bug is a security vulnerability ***

Public security bug reported:

Since updating to oneiric, plymouth displays the boot cryptsetup passphrases in 
the clear!
It's asterisks on the first device, which alone is a problem, see bug 778659.
Filing this new bug, since passphrases in the clear are another can of worms.

** Affects: plymouth (Ubuntu)
 Importance: Undecided
 Status: New

** Visibility changed to: Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/880348

Title:
  boot cryptsetup passphrase prompt displays passphrase in clear text

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/880348/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 880348] Re: boot cryptsetup passphrase prompt displays passphrase in clear text

2011-10-23 Thread ilf
*** This bug is a duplicate of bug 877403 ***
https://bugs.launchpad.net/bugs/877403

Wow! I commented it 10-13, the other report was filed on 10-18.
Way to take this seriously. (Yes Ubuntu, I am pissed.)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/880348

Title:
  boot cryptsetup passphrase prompt displays passphrase in clear text

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/880348/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 839595] Re: failsafe.conf's 30 second time out is too low

2011-10-14 Thread ilf
I don't like this behavior.

I have eth0 auto in /etc/network/interfaces, so that it gets auto-enabled when 
plugged in.
This being a laptop it gets moved around and doesn't always have an ethernet 
connection plugged in.
No I'm supposed to wait two minutes on every boot OR not have the interface 
connected?
Both are no real options for me.

What does this mean?
 only servers and dedicated workstations should have network interfaces 
 configured in this way

How else should I have my interface configured?
BTW, I do not run Gnome, KDE or any other of those desktop environments. I do 
not have NetworkManager installed and won't install it for this.

I deleted my /etc/init/failsafe.conf for now.
But I really think this behavior shouldn't be forced.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/839595

Title:
  failsafe.conf's 30 second time out is too low

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/839595/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 839595] Re: failsafe.conf's 30 second time out is too low

2011-10-14 Thread ilf
Thanks for your workaround, using that now.

I still think it's wrong to assume that one of these three has to exist on a 
system:
- auto eth0 and eth0 always plugged in
- network-manager installed
- boot time delayed by two minutes.

And no, I won't install network-manager even if it doesn't depend on X.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/839595

Title:
  failsafe.conf's 30 second time out is too low

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/839595/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 778659] Re: boot cryptsetup passphrase prompt echoes typed characters as stars

2011-10-13 Thread ilf
Nope, still the same on a freshly updated 11.10.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/778659

Title:
  boot cryptsetup passphrase prompt echoes typed characters as stars

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/778659/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 778659] Re: boot cryptsetup passphrase prompt echoes typed characters as stars

2011-10-13 Thread ilf
OMFG. Updated another box.
It still displays a star for every character when unlocking the first (system) 
disk.
But it displays the plain passphrases for all my other disks after the first 
one!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/778659

Title:
  boot cryptsetup passphrase prompt echoes typed characters as stars

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/778659/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 778659] Re: boot cryptsetup passphrase prompt echoes typed characters as stars

2011-10-13 Thread ilf
Can anyone else check this out please?
Then raise the Importance to Critical.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/778659

Title:
  boot cryptsetup passphrase prompt echoes typed characters as stars

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/778659/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 92383] Re: WRITE@LBA=288830h failed with SK=7h/ASC=00h/ACQ=00h]: Input/output error

2011-09-27 Thread ilf
I just hit this on an up to date Natty with growisofs 7.1-9 and linux-
image-2.6.38-11-generic 2.6.38-11.50:

growisofs:
Executing 'builtin_dd if=roor-rangoex-dvdr.img of=/dev/sr0 obs=32k seek=0'
/dev/sr0: Current Write Speed is 16.4x1352KBps.
:-[ WRITE@LBA=0h failed with SK=0h/ASC=00h/ACQ=02h]: Input/output error
:-( write failed: Input/output error

/var/log/kern.log
ata6.00: exception Emask 0x0 SAct 0x0 SErr 0x0 action 0x6 frozen
CDB: Write(10): 2a 00 00 00 00 00 00 00 10 00
ata6.00: cmd a0/01:00:00:00:80/00:00:00:00:00/a0 tag 0 dma 32768 out
 res 40/00:02:00:18:00/00:00:00:00:00/a0 Emask 0x4 (timeout)
ata6.00: status: { DRDY }
ata6: hard resetting link
ata6: SATA link up 1.5 Gbps (SStatus 113 SControl 310) 
ata6.00: configured for UDMA/100 
ata6: EH complete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/92383

Title:
  WRITE@LBA=288830h failed with SK=7h/ASC=00h/ACQ=00h]: Input/output
  error

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dvd+rw-tools/+bug/92383/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 92383] Re: WRITE@LBA=288830h failed with SK=7h/ASC=00h/ACQ=00h]: Input/output error

2011-09-27 Thread ilf
I was able to burn the same command on the exact same hardware and software 
setup after a reboot.
This is the second time I hit this bug in about five burn times. I cannot make 
a pattern yet.

When it happens, the drive in question is locked by the kernel and still 
spinning when it happens.
Only a cold reboot fixes this, sudo reboot now didn't help.

This is highly annoying, wasting an empty DVD and having to reboot!

hdparm also fails:
% sudo hdparm -d 0 /dev/sr0
/dev/sr0:
 setting using_dma to 0 (off)
 HDIO_SET_DMA failed: Inappropriate ioctl for device
 HDIO_GET_DMA failed: Inappropriate ioctl for device

% sudo hdparm /dev/sr0 
/dev/sr0:
 multcount =  0 (off)
 IO_support=  0 (default) 
 readonly  =  0 (off)
 readahead = 256 (on)
 HDIO_GETGEO failed: Inappropriate ioctl for device

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/92383

Title:
  WRITE@LBA=288830h failed with SK=7h/ASC=00h/ACQ=00h]: Input/output
  error

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dvd+rw-tools/+bug/92383/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 793628] Re: incorrectly hangs waiting for user confirmation

2011-07-28 Thread ilf
And again. This time the first apticron process seems to spawn a
kworker just hanging there.


root 16809  0.0  0.0  35732  1096 ?S07:59   0:00 CRON
root 16810  0.0  0.0   4220   588 ?Ss   07:59   0:00 /bin/sh -c 
apticron
root 16811  0.0  0.0  12336  1708 ?S07:59   0:00 /bin/bash -e 
/usr/sbin/apticron
root 16860  0.0  0.0  0 0 ?S07:59   0:00 [kworker/0:1]
root 20478  0.0  0.0  35732  1096 ?S08:59   0:00 CRON
root 20479  0.0  0.0   4220   588 ?Ss   08:59   0:00 /bin/sh -c 
apticron
root 20480  0.0  0.0  12336  1708 ?S08:59   0:00 /bin/bash -e 
/usr/sbin/apticron
root 20559  0.0  0.0  12336  1184 ?S08:59   0:00 /bin/bash -e 
/usr/sbin/apticron
root 20560  0.0  0.0  12336   824 ?S08:59   0:00 /bin/bash -e 
/usr/sbin/apticron
root 20564  0.0  0.0   6300   604 ?S08:59   0:00 /usr/bin/mailx 
-a MIME-Version: 1.0 -a Content-type: text/plain; charset=UTF-8 -a 
Content-transfer-encoding: 8bit -s 3 Ubuntu package update(s) for flatline root
root 20624  0.0  0.3  63472 13808 ?S08:59   0:00 
/usr/bin/python /usr/bin/apt-listchanges --which=both --headers -f text 
/var/cache/apt/archives/lyx_2.0.0-1~natty1_amd64.deb 
/var/cache/apt/archives/lyx-common_2.0.0-1~natty1_all.deb 
/var/cache/apt/archives/update-manager-core_1%3a0.150.3_amd64.deb
root 20636  0.0  0.6  47140 24800 ?S08:59   0:00 apt-get 
changelog lyx=2.0.0-1~natty1
root 20645  0.0  0.0   4220   588 ?S08:59   0:00 /bin/sh 
/usr/bin/sensible-pager /tmp/apt-changelog-xCp56tchangelog
root 20646  0.0  0.0   4220   604 ?S08:59   0:00 /bin/sh 
/usr/bin/pager /tmp/apt-changelog-xCp56tchangelog
root 20740  0.0  0.0  33464  3336 ?S08:59   0:00 vim -R -c let 
no_plugin_maps = 1 -c set scrolloff=999 -c runtime! macros/less.vim -c set 
foldlevel=999 -c set mouse=h -c set nonu -c nmap ESCu :nohlsearchcr 
/tmp/apt-changelog-xCp56tchangelog

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/793628

Title:
  incorrectly hangs waiting for user confirmation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt-listchanges/+bug/793628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 793628] Re: incorrectly hangs waiting for user confirmation

2011-06-14 Thread ilf
This doesn't happen every time, but now I have it again.Output from ps
aux | grep -v grep | grep (apticron|apt-listchanges|pager):

root  7052  0.0  0.0  35736  1124 ?S13:59   0:00 CRON
root  7053  0.0  0.0   4220   584 ?Ss   13:59   0:00 /bin/sh -c 
apticron
root  7054  0.0  0.0  12336  1712 ?S13:59   0:00 /bin/bash -e 
/usr/sbin/apticron
root  7146  0.0  0.0  12340  1192 ?S13:59   0:00 /bin/bash -e 
/usr/sbin/apticron
root  7147  0.0  0.0  12336   824 ?S13:59   0:00 /bin/bash -e 
/usr/sbin/apticron
root  7151  0.0  0.0   6300   668 ?S13:59   0:00 /usr/bin/mailx 
-a MIME-Version: 1.0 -a Content-type: text/plain; charset=UTF-8 -a 
Content-transfer-encoding: 8bit -s 11 Ubuntu package update(s) for flatline root
root  7323  0.0  0.3  63432 13764 ?S13:59   0:00 
/usr/bin/python /usr/bin/apt-listchanges --which=both --headers -f text 
/var/cache/apt/archives/cups_1.4.6-5ubuntu1.2_amd64.deb 
/var/cache/apt/archives/cups-bsd_1.4.6-5ubuntu1.2_amd64.deb 
/var/cache/apt/archives/cups-client_1.4.6-5ubuntu1.2_amd64.deb 
/var/cache/apt/archives/cups-common_1.4.6-5ubuntu1.2_all.deb 
/var/cache/apt/archives/cups-ppdc_1.4.6-5ubuntu1.2_amd64.deb 
/var/cache/apt/archives/libcups2_1.4.6-5ubuntu1.2_amd64.deb 
/var/cache/apt/archives/libcupscgi1_1.4.6-5ubuntu1.2_amd64.deb 
/var/cache/apt/archives/libcupsdriver1_1.4.6-5ubuntu1.2_amd64.deb 
/var/cache/apt/archives/libcupsimage2_1.4.6-5ubuntu1.2_amd64.deb 
/var/cache/apt/archives/libcupsmime1_1.4.6-5ubuntu1.2_amd64.deb 
/var/cache/apt/archives/libcupsppdc1_1.4.6-5ubuntu1.2_amd64.deb
root  7335  0.0  0.5  46460 24184 ?S13:59   0:00 apt-get 
changelog cups=1.4.6-5ubuntu1.2
root  7344  0.0  0.0   4220   588 ?S13:59   0:00 /bin/sh 
/usr/bin/sensible-pager /tmp/apt-changelog-nFISUschangelog
root  7345  0.0  0.0   4220   604 ?S13:59   0:00 /bin/sh 
/usr/bin/pager /tmp/apt-changelog-nFISUschangelog
root  7439  0.0  0.0  33688  3540 ?S13:59   0:00 vim -R -c let 
no_plugin_maps = 1 -c set scrolloff=999 -c runtime! macros/less.vim -c set 
foldlevel=999 -c set mouse=h -c set nonu -c nmap ESCu :nohlsearchcr 
/tmp/apt-changelog-nFISUschangelog

Why is it calling the pager? It should not do this.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/793628

Title:
  incorrectly hangs waiting for user confirmation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt-listchanges/+bug/793628/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 216847] Re: sshd will not start at boot if ListenAddress is set, because network interface is not yet up

2011-06-09 Thread ilf
Three years and six releases later, this is still present :(

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/216847

Title:
  sshd will not start at boot if ListenAddress is set, because network
  interface is not yet up

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/216847/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 216847] Re: sshd will not start at boot if ListenAddress is set, because network interface is not yet up

2011-06-09 Thread ilf
Three years and six releases later, this is still present :(

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/216847

Title:
  sshd will not start at boot if ListenAddress is set, because network
  interface is not yet up

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/216847/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 793628] [NEW] incorrectly hangs waiting for user confirmation

2011-06-06 Thread ilf
Public bug reported:

Binary package hint: apt-listchanges

I call apt-listchanges 2.85.6ubuntu1 from apticron 1.1.45.

Since the Upgrade to Natty, it just hung there for the second time, spawning 
the pager and apparently waiting for user input.
It should not do that, since I specified both frontend=text and confirm=0 in 
the config:

% cat /etc/apt/listchanges.conf
[apt]
frontend=text
email_address=
confirm=0
save_seen=/var/lib/apt/listchanges.db
which=both

** Affects: apt-listchanges (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/793628

Title:
  incorrectly hangs waiting for user confirmation

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 566818] Re: Cryptsetup passphrase prompt during boot: every character typed repeats the prompt

2011-06-04 Thread ilf
This is only partly fixed.
When the prompt is cleared, it still prints a new line.
See hitting ESC when empty, or ^U at any stage.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/566818

Title:
  Cryptsetup passphrase prompt during boot: every character typed
  repeats the prompt

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 566818] Re: Cryptsetup passphrase prompt during boot: every character typed repeats the prompt

2011-05-06 Thread ilf
I can confirm the new package fixed the newline issue.

But my general problem from #3 remains:
Now the amount of characters in the passphrase is echoed (with stars), before 
it was silent like sudo f.e.

The amount of characters typed is still displayed with starts, this
should be empty.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/566818

Title:
  Cryptsetup passphrase prompt during boot: every character typed
  repeats the prompt

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 566818] Re: Cryptsetup passphrase prompt during boot: every character typed repeats the prompt

2011-05-06 Thread ilf
So the cosmetic problem is fixed, the security issue ignored? Whoah.

Should the new bug be against plymouth or cryptsetup?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/566818

Title:
  Cryptsetup passphrase prompt during boot: every character typed
  repeats the prompt

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 778659] [NEW] boot cryptsetup passphrase prompt echoes typed characters as stars

2011-05-06 Thread ilf
*** This bug is a security vulnerability ***

Public security bug reported:

Binary package hint: plymouth

So #566818 is fixed and plymouth no longer causes the cryptsetup
passphrase prompt during boot to repeat the prompt with every character
typed.

It still echoes an asterisk for every character typed. I consider this a
security issue, since this reveals on the screen how many characters the
passphrase consists of.

sudo and cryptsetup (and many others) do not echo anything when typing
in passphrases. This is a deliberate security feature. plymouth should
respect this and also not echo enything after the prompt.

** Affects: plymouth (Ubuntu)
 Importance: Undecided
 Status: New

** Visibility changed to: Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/778659

Title:
  boot cryptsetup passphrase prompt echoes typed characters as stars

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 566818] Re: Cryptsetup passphrase prompt during boot: every character typed repeats the prompt

2011-05-06 Thread ilf
There's a reason sudo and cryptsetup don't echo anything. It's called
security.

Anyways, here's the new bug:
https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/778659

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/566818

Title:
  Cryptsetup passphrase prompt during boot: every character typed
  repeats the prompt

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 566818] Re: [Lucid] cryptsetup passphrase prompt during boot: every character typed repeats the prompt

2010-12-09 Thread ilf
Until now I only used upgraded Ubuntu versions and thought it might be some old 
config.
But no, this is present on a freshly installed Maverick, too!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/566818

Title:
  [Lucid] cryptsetup passphrase prompt during boot: every character typed 
repeats the prompt

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 665813] [NEW] mplayer freezes with green screen

2010-10-24 Thread ilf
Public bug reported:

Binary package hint: mplayer

Version: 2:1.0~rc4~try1.dsfg1-1ubuntu1

After an upgrade from Lucid to Maverick, mplayer started to sometimes freeze.
Immediately when starting to play a video, mplayer outputs no audio, only shows 
a green screen and even freezes X.
I can't exactly reproduce it, this happens 1 out of 5-10 times I play a video.
It's not limited to a certain file, either.

I had vo=vdpau,xv,x11 in mplayer.conf at first, also tried vo=xv,x11 and now 
use the default, which uncomments # vo=.
All the same.

** Affects: mplayer (Ubuntu)
 Importance: Undecided
 Status: New

-- 
mplayer freezes with green screen
https://bugs.launchpad.net/bugs/665813
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 566818] Re: [Lucid] cryptsetup passphrase prompt during boot: every character typed repeats the prompt

2010-10-10 Thread ilf
I can confirm that this is still present on a freshly upgraded Maverick release.
The importance should be increased, since as I said in #3, this is not only 
annoying, but a security implication, displaying how many characters my 
passphrase consists of.
I hope we don't have to wait for another release to finally fix this.

-- 
[Lucid] cryptsetup passphrase prompt during boot: every character typed repeats 
the prompt
https://bugs.launchpad.net/bugs/566818
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 407972] Re: Update kismet to latest version

2010-09-27 Thread ilf
And even newer: 2010-07-R1 from Tue Jul 13 2010:

Re-architected and bug-fixed IPC subsystem, hidedata option to prevent
any processing of data frames, general internal bugfixes and
improvements, ruby API and examples, zero-priv drone-only options.

http://www.kismetwireless.net/download.shtml

-- 
Update kismet to latest version
https://bugs.launchpad.net/bugs/407972
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 630085] [NEW] new upstream 0.7.94

2010-09-04 Thread ilf
Public bug reported:

Binary package hint: libgpod4

0.7.94 of libgpod has been released, adding support for newer iPod
models: http://sourceforge.net/projects/gtkpod/files/

** Affects: libgpod (Ubuntu)
 Importance: Undecided
 Status: New

-- 
new upstream 0.7.94
https://bugs.launchpad.net/bugs/630085
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 615382] Re: burning fails to reload tray

2010-09-04 Thread ilf
And bad again. Didn't reboot, didn't update, didn't change settings.
This is driving me nuts.

-- 
burning fails to reload tray
https://bugs.launchpad.net/bugs/615382
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 615382] Re: burning fails to reload tray

2010-09-04 Thread ilf
This is probably related:

Sometimes, when ejecting the tray of my CD/DVD-R drive, it opens a
little, but immediately closes again. WTF.

-- 
burning fails to reload tray
https://bugs.launchpad.net/bugs/615382
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 615382] Re: burning fails to reload tray

2010-08-23 Thread ilf
Euh, yeah. Now it works again. I have no idea, what changed.
The program versions are still the same and I didn't touch their config.

-- 
burning fails to reload tray
https://bugs.launchpad.net/bugs/615382
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 615382] Re: burning fails to reload tray

2010-08-18 Thread ilf
** Changed in: dvd+rw-tools (Ubuntu)
   Status: New = Confirmed

-- 
burning fails to reload tray
https://bugs.launchpad.net/bugs/615382
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 447604] Re: xpdf warnings Cannot convert string * to type FontStruct

2010-08-12 Thread ilf
Ah, with both gsfonts-x11 and poppler-data installed, the Warning 
messages go away.
I think the .deb should suggest these two. Right now they are nowhere mentioned.

Through your links I came to this site suggesting the problem lies
upstream: http://zinser.no-ip.info/vms/sw/notes/xpdf.htmlx

The following issues were reported by OpenVMS users of Xpdf. They are
acknowledged by the author of Xpdf and should be resolved during the
next couple of maintenance releases

During startup of Xpdf the message Warning: Cannot convert string 
-*-times-medium-r-normal--16-*-*-*-*-*-iso8859-1 to type FontStruct is 
displayed
This message can be safely ignored. This particular font is used only 
inside of the About window of Xpdf. It will be replaced in there by a default 
font. The display of PDF documents is not affected at all by this.
The solution will make the font settable via an Xresource.
The same behaviour can be observed on Linux systems.


But 3.02-9 fails to start with Floating point exception no matter what I try.
Should I file a new bug on this?

-- 
xpdf warnings Cannot convert string * to type FontStruct
https://bugs.launchpad.net/bugs/447604
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 447604] Re: xpdf warnings Cannot convert string * to type FontStruct

2010-08-11 Thread ilf
Was missing gsfonts-x11.
But even with both installed, I get the same error with 3.02-9, and it refuses 
to start.

-- 
xpdf warnings Cannot convert string * to type FontStruct
https://bugs.launchpad.net/bugs/447604
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 615382] [NEW] burning fails to reload tray

2010-08-09 Thread ilf
Public bug reported:

Binary package hint: dvd+rw-tools

On an up-to-date Lucid, genisoimage 9:1.1.10-1ubuntu1 with dvd+rw-tools
7.1-6 burns DVD-Rs fine, but exits with 1, because it cannot reload the
tray:

growisofs -quiet -dvd-compat -Z /dev/cdrw -dvd-video video/
Executing 'genisoimage -quiet -dvd-video video/ | builtin_dd of=/dev/cdrw 
obs=32k seek=0'
/dev/cdrw: Current Write Speed is 20.5x1352KBps.
builtin_dd: 2110912*2KB out @ average 13.0x1352KBps
/dev/cdrw: flushing cache
/dev/cdrw: updating RMA
/dev/cdrw: closing disc
:-( unable to reload tray: No such file or directory

This hasn't always been this way.
What causes this? How to fix it?

** Affects: dvd+rw-tools (Ubuntu)
 Importance: Undecided
 Status: New

-- 
burning fails to reload tray
https://bugs.launchpad.net/bugs/615382
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 615382] Re: burning fails to reload tray

2010-08-09 Thread ilf
I gave you the command I executed:

$ growisofs -quiet -dvd-compat -Z /dev/cdrw -dvd-video video/

The output should have been an exit code of 0.
It was an exit code of 1 with the above mentioned error.

What more do you need?

-- 
burning fails to reload tray
https://bugs.launchpad.net/bugs/615382
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 447604] Re: xpdf warnings Cannot convert string * to type FontStruct

2010-08-08 Thread ilf
No, it's not.

Not only does it still output 2 of those 4 messages:

Warning: Cannot convert string 
-*-helvetica-medium-r-normal--12-*-*-*-*-*-iso8859-1 to type FontStruct
Warning: Cannot convert string 
-*-courier-medium-r-normal--12-*-*-*-*-*-iso8859-1 to type FontStruct

It also fails to start with a Floating point exception.

** Changed in: xpdf (Ubuntu)
   Status: Fix Released = New

-- 
xpdf warnings Cannot convert string * to type FontStruct
https://bugs.launchpad.net/bugs/447604
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 558384] Re: Settings dhcp in /etc/network/interfaces does not create /etc/resolv.conf

2010-06-14 Thread ilf
A me too here.

This doesn't sound like a resolvconf bug, since Alvin said his 
/etc/resolv.conf is missing after boot.
With the resolvconf-package installed, the file exists, but consists of the 
two resolvconf(8) comment lines.

This seems to be an issue with DHCP on boot: IP address, gateway and the
like are assigned fine, but nameserver is not.

A fix would be appreciated.

-- 
Settings dhcp in /etc/network/interfaces does not create /etc/resolv.conf
https://bugs.launchpad.net/bugs/558384
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 566818] Re: [Lucid] cryptsetup passphrase prompt during boot: every character typed repeats the prompt

2010-05-09 Thread ilf
Contrary to Matt (#2), this happens also with quiet as boot option.
So it seems to happen throughout Lucid with encrypted disks in /etc/crypttab 
and without splash screen.
Did I mention this it quite annoying? :)

** Summary changed:

- Ubuntu Server Encrypted LVM password prompt: every character typed repeats 
the prompt
+ [Lucid] cryptsetup passphrase prompt during boot: every character typed 
repeats the prompt

-- 
[Lucid] cryptsetup passphrase prompt during boot: every character typed repeats 
the prompt
https://bugs.launchpad.net/bugs/566818
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 574704] Re: munin-node after update to Lucid still in /etc/rc*.d, invoked twice

2010-05-05 Thread ilf
Thanks for the hint.
Indeed, it's still started by upstart and removing /etc/rc?.d and 
/etc/init.d/munin-node has no effect on this.
So there should probably be a postinst/postrm for at least /etc/rc?.d.

-- 
munin-node after update to Lucid still in /etc/rc*.d, invoked twice
https://bugs.launchpad.net/bugs/574704
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to munin in ubuntu.

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 574704] Re: munin-node after update to Lucid still in /etc/rc*.d, invoked twice

2010-05-05 Thread ilf
Since I deleted the files by hand, I'm probably not suited to see if it
works now.

-- 
munin-node after update to Lucid still in /etc/rc*.d, invoked twice
https://bugs.launchpad.net/bugs/574704
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to munin in ubuntu.

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 574704] Re: munin-node after update to Lucid still in /etc/rc*.d, invoked twice

2010-05-05 Thread ilf
Thanks for the hint.
Indeed, it's still started by upstart and removing /etc/rc?.d and 
/etc/init.d/munin-node has no effect on this.
So there should probably be a postinst/postrm for at least /etc/rc?.d.

-- 
munin-node after update to Lucid still in /etc/rc*.d, invoked twice
https://bugs.launchpad.net/bugs/574704
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 574704] Re: munin-node after update to Lucid still in /etc/rc*.d, invoked twice

2010-05-05 Thread ilf
Since I deleted the files by hand, I'm probably not suited to see if it
works now.

-- 
munin-node after update to Lucid still in /etc/rc*.d, invoked twice
https://bugs.launchpad.net/bugs/574704
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 574704] [NEW] munin-node after update to Lucid still in /etc/rc*.d, invoked twice

2010-05-03 Thread ilf
Public bug reported:

Binary package hint: munin

With system upgrade from Karmic to Lucid, munin-node was upgraded from
1.2.6-13ubuntu3 to 1.4.4-1ubuntu1.

Now on boot, i get the following in /var/log/boot.log:

  Rather than invoking init scripts through /etc/init.d, use the service(8)
  utility, e.g. service S98munin-node start
  Since the script you are attempting to invoke has been converted to an
  Upstart job, you may also use the start(8) utility, e.g. start S98munin-node
  start: Unknown job: S98munin-node

There is a /etc/init/munin-node.conf for invoking it via Upstart.
There's also /etc/init.d/munin-node, a symlink to /lib/init/upstart-job.

It seems the problem are these symlinks to /etc/init.d/munin-node:

  /etc/rc0.d/K20munin-node
  /etc/rc1.d/K20munin-node
  /etc/rc2.d/S98munin-node
  /etc/rc3.d/S98munin-node
  /etc/rc4.d/S98munin-node
  /etc/rc5.d/S98munin-node
  /etc/rc6.d/K20munin-node

How to fix this error?
Can I just delete the symlinks in /etc/rc*.d?
Will upstart then still know to start it on boot?

** Affects: munin (Ubuntu)
 Importance: Undecided
 Status: New

-- 
munin-node after update to Lucid still in /etc/rc*.d, invoked twice
https://bugs.launchpad.net/bugs/574704
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to munin in ubuntu.

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 574704] [NEW] munin-node after update to Lucid still in /etc/rc*.d, invoked twice

2010-05-03 Thread ilf
Public bug reported:

Binary package hint: munin

With system upgrade from Karmic to Lucid, munin-node was upgraded from
1.2.6-13ubuntu3 to 1.4.4-1ubuntu1.

Now on boot, i get the following in /var/log/boot.log:

  Rather than invoking init scripts through /etc/init.d, use the service(8)
  utility, e.g. service S98munin-node start
  Since the script you are attempting to invoke has been converted to an
  Upstart job, you may also use the start(8) utility, e.g. start S98munin-node
  start: Unknown job: S98munin-node

There is a /etc/init/munin-node.conf for invoking it via Upstart.
There's also /etc/init.d/munin-node, a symlink to /lib/init/upstart-job.

It seems the problem are these symlinks to /etc/init.d/munin-node:

  /etc/rc0.d/K20munin-node
  /etc/rc1.d/K20munin-node
  /etc/rc2.d/S98munin-node
  /etc/rc3.d/S98munin-node
  /etc/rc4.d/S98munin-node
  /etc/rc5.d/S98munin-node
  /etc/rc6.d/K20munin-node

How to fix this error?
Can I just delete the symlinks in /etc/rc*.d?
Will upstart then still know to start it on boot?

** Affects: munin (Ubuntu)
 Importance: Undecided
 Status: New

-- 
munin-node after update to Lucid still in /etc/rc*.d, invoked twice
https://bugs.launchpad.net/bugs/574704
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 571932] Re: [i945]: Lucid startx looks for files in /usr/lib/dri/ - error

2010-04-30 Thread ilf
Thanks for the hint. Indeed xorg depends on it, but xserver-xorg-core and 
xserver-xorg only recommend it.
That's why I didn't have it installed.

** Changed in: xserver-xorg-video-intel (Ubuntu)
   Status: Incomplete = Invalid

-- 
[i945]: Lucid startx looks for files in /usr/lib/dri/ - error
https://bugs.launchpad.net/bugs/571932
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 566818] Re: Ubuntu Server Encrypted LVM password prompt: every character typed repeats the prompt

2010-04-29 Thread ilf
I am also experiencing this on both my machines after upgrade to Lucid
10.04 Release.

This is not only annoying, but I consider this a security bug: Now the
amount of characters in the passphrase is echoed (with starts), before
it was silent like sudo f.e.

I would really like a fix for this.

plymouth 0.8.2-2ubuntu2
cryptsetup 2:1.1.0~rc2-1ubuntu13

-- 
Ubuntu Server Encrypted LVM password prompt: every character typed repeats the 
prompt
https://bugs.launchpad.net/bugs/566818
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 433926] Re: [karmic] xkbcomp error message

2010-04-29 Thread ilf
This is still present in Lucid Release :(

-- 
[karmic] xkbcomp error message
https://bugs.launchpad.net/bugs/433926
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 571932] [NEW] [i945]: Lucid startx looks for files in /usr/lib/dri/ - error

2010-04-29 Thread ilf
Public bug reported:

Binary package hint: xserver-xorg-video-intel

Freshly updated Lucid on a MSI Wind U100.
'startx' produces these errors on TTY and in /var/log/Xorg.0.log:

  (EE) AIGLX error: dlopen of /usr/lib/dri/i915_dri.so failed 
(/usr/lib/dri/i915_dri.so: cannot open shared object file: No such file or 
directory)
  (EE) AIGLX: reverting to software rendering
  (EE) AIGLX error: dlopen of /usr/lib/dri/swrast_dri.so failed 
(/usr/lib/dri/swrast_dri.so: cannot open shared object file: No such file or 
directory)
  (EE) GLX: could not load software renderer

xserver-xorg-video-intel 2:2.9.1-3ubuntu5
xserver-xorg 1:7.5+5ubuntu1

$ lspci | grep VGA
00:02.0 VGA compatible controller: Intel Corporation Mobile 945GME Express 
Integrated Graphics Controller (rev 03)

** Affects: xserver-xorg-video-intel (Ubuntu)
 Importance: Undecided
 Status: New

-- 
[i945]: Lucid startx looks for files in /usr/lib/dri/ - error
https://bugs.launchpad.net/bugs/571932
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 567913] Re: No audio in wmv-files: Cannot find codec for audio format 0x161

2010-04-23 Thread ilf
Any updates on shortly?

Also, shouldn't #567913 and #567682 be dupes of #567159? :)

-- 
No audio in wmv-files: Cannot find codec for audio format 0x161
https://bugs.launchpad.net/bugs/567913
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 567159] [NEW] libavcodec52 4:0.5+svn20090706-2ubuntu2.1 regression: audio codec families not available

2010-04-20 Thread ilf
Public bug reported:

Binary package hint: mplayer

Ubuntu Security Notice USN-931-1 updated libavcodec52 from
4:0.5+svn20090706-2ubuntu2 to 4:0.5+svn20090706-2ubuntu2.1 on Ubuntu
9.10: http://www.ubuntu.com/usn/USN-931-1

This update breaks support for some audio codec families, f.e. afm=dmo
and afm=acm no longer work.

Attached is a diff from mplayer output of the same file, once with
~2ubuntu2, once with ~2ubuntu2.1.

** Affects: mplayer (Ubuntu)
 Importance: Undecided
 Status: New

-- 
libavcodec52 4:0.5+svn20090706-2ubuntu2.1 regression: audio codec families not 
available
https://bugs.launchpad.net/bugs/567159
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 567159] Re: libavcodec52 4:0.5+svn20090706-2ubuntu2.1 regression: audio codec families not available

2010-04-20 Thread ilf

** Attachment added: libavcodec52.diff
   http://launchpadlibrarian.net/44884578/libavcodec52.diff

-- 
libavcodec52 4:0.5+svn20090706-2ubuntu2.1 regression: audio codec families not 
available
https://bugs.launchpad.net/bugs/567159
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 433926] Re: [karmic] xkbcomp error message

2010-03-26 Thread ilf
Euh, this bug is still present in my up-to-date Karmic.
And my /usr/share/X11/xkb/symbols/level3 still has the same timestamp as 
reported above.
It also seems it's not fixed upstream yet.

I can't run a Lucid Beta right now.

But I am wondering: should bugs really be closed because of no response?
That feels kind of rude. What should I have responded?

Btw, I have neither xkeyboard-config nor xkbcomp installed.

** Changed in: xkeyboard-config (Ubuntu)
   Status: Invalid = New

-- 
[karmic] xkbcomp error message
https://bugs.launchpad.net/bugs/433926
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 361510] Re: [Jaunty] PolicyKit: no active session in X - no ACLs for sound card

2010-02-06 Thread ilf
Ahem, the correct solution is of course:

$ sudo adduser user audio

-- 
[Jaunty] PolicyKit: no active session in X - no ACLs for sound card
https://bugs.launchpad.net/bugs/361510
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 493203] [NEW] libwww-perl 5.831-1: Transfer truncated - fixed in newer Debian package

2009-12-06 Thread ilf
Public bug reported:

Binary package hint: libwww-perl

On up-to-date Karmic, libwww-perl 5.831-1 throws out this Bug 
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=548417 at perl -MCPAN -e 
'install FOO':
Transfer truncated: only  out of BAR bytes received

Installing current libwww-perl 5.834-1 from the Debian Sid repo fixed it.
The other reports suggest, this was already fixed in 5.812-1.

So please update the package in Karmic repo.

Thanks :)

** Affects: libwww-perl (Ubuntu)
 Importance: Undecided
 Status: New

-- 
libwww-perl 5.831-1: Transfer truncated - fixed in newer Debian package
https://bugs.launchpad.net/bugs/493203
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 464500] [NEW] When polipo is not running the cron.daily script exits with anon-zero return value

2009-10-30 Thread ilf
Public bug reported:

Binary package hint: polipo

Polipo (1.0.4-1.1), same as upstream where the bug also occurs:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=549981

The non-zero return value leads to cron sending out mails, which is not really 
necessary and annoying.
Adding echo exit 0  /etc/cron.daily/polipo as suggested upstream doesn't 
work.

** Affects: polipo (Ubuntu)
 Importance: Undecided
 Status: New

-- 
When polipo is not running the cron.daily script exits with anon-zero return 
value
https://bugs.launchpad.net/bugs/464500
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


  1   2   >