** Changed in: brasero (Ubuntu)
Status: Incomplete => Confirmed
--
When trying to copy 1:1 CD asks me to manually install cdda2wav then quits
https://bugs.launchpad.net/bugs/600851
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
-
The program cdrdao is provided by the package cdrdao. cdda2wav is
provided by the package icedax. Installing both packages resolved the
problem for me.
The package cdrdao is mentioned in the brasero package as a Suggest, but
the icedax dependency is completely missing. Should be fixed. Maybe both
Anybody willing (and able) to raise the importance of this bug? I really
miss the zoom and length unit widgets.
--
Regression: Gimp has no progressbar
https://bugs.launchpad.net/bugs/537275
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: gnome-keyring-manager
Status: New => Invalid
** Changed in: gnome-keyring
Status: New => Invalid
--
Thinkfinger doesn't unlock keyring
https://bugs.launchpad.net/bugs/276384
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscrib
Similar problem in /usr/share/doc/openvpn/examples/easy-rsa/2.0/build-
dh. Should be
if [ -d "$KEY_DIR" ] && [ $KEY_SIZE ]; then
$OPENSSL dhparam -out "${KEY_DIR}/dh${KEY_SIZE}.pem" ${KEY_SIZE}
in line 6 ff.
P.S.: Forgot to tell: Version is openvpn 2.1~rc11-1ubuntu3 as shipped
with jaunty.
Public bug reported:
Binary package hint: openvpn
The script /usr/share/doc/openvpn/examples/easy-rsa/2.0/vars does not
quote the variable $EASY_RSA in line 29 properly and should be adjusted
like this:
export KEY_CONFIG=`"$EASY_RSA/whichopensslcnf" "$EASY_RSA"`
The $EASY_RSA variable contains
I'm afraid, but I that doesn't seem to work. (hardy-fix.debdiff)
~/src/roundcube-0.1~rc2$ patch -p1 < ../hardy-fix.debdiff
patching file debian/control
patching file debian/changelog
patching file debian/control.in
patching file debian/patches/series
patching file debian/patches/cve-2008-5619.pat
> CVE 2008-5619 states "html2text.php in RoundCube Webmail
(roundcubemail) 0.2-1.alpha and 0.2-3.beta allows remote attackers to
execute arbitrary code via crafted input that is processed by the
preg_replace function with the eval switch. " These versions have never
entered Ubuntu.
I think, this i
Added Gnome bug #572203, because the other referenced Gnome bug is
outdated.
** Changed in: nautilus
Bugwatch: GNOME Bug Tracker #405052 => GNOME Bug Tracker #572203
Status: New => Unknown
--
.desktop files provide simple infection vector for trojans
https://bugs.launchpad.net/bugs/1
I've added the Debian Bug link. There is another security related bug
fixed in http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=509596. The
changeset mentioned above covers both.
** Bug watch added: Debian Bug tracker #508628
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508628
** Also affe
Sorry, I'm not sure if I can provide a debdiff, because I've never done
that before. Just in case there is somebody with a little more expertise
sitting out there. The changeset is here:
http://trac.roundcube.net/changeset/2162 The update notice here:
http://sourceforge.net/forum/forum.php?forum_id
I'm not sure if it would be a good idea to actively encourage this.
Maybe just create a new README file under /usr/share/doc/libpam-
thinkfinger?
--
Thinkfinger doesn't unlock keyring
https://bugs.launchpad.net/bugs/276384
You received this bug notification because you are a member of Ubuntu
Bugs
> But I think you missed something about the encryption, and the
> fingerprint data, which indeed would be some kind of hash or string.
> Then why can the fingerprint data itself not be a key,
Because of what Milan wrote. Your fingerprint isn't exactly the same,
whenever you scan it. Maybe you tur
@loke:
NO, IT CAN'T!
Sorry, maybe I'm just too stupid to explain this in a comprehensible
way.
Last try:
Authentication and encryption are two fundamental different things. You
can't "unlock" an encrypted thing(tm) with a fingerprint. To decrypt an
encrypted thing you need to know the secret, w
> Is this still an issue for anyone?
I think so. I myself use another mail client, but the issue is still
present in Intrepid. Just tested it, and it used SASL LOGIN although
CRAM-MD5 was available.
Of course, there is an option in the wizard now, where you can disable
downloading mail immediatel
> Ah. Been digging around and found some wonderful insight on this
issue.
That's essentially what I wrote. And I also wrote, that you could use a
null passphrase for your gnome keyring, if you don't mind storing your
passwords in an unencrypted, unsecure way because you want to save your
1 minute
Of course everything less than full harddisk encryption is "security
theater", if you've got knowledgable enemies with unmonitored physical
access to your laptop.
But that was not my point. Everybody has to decide for himself, which
level of security is appropriate for him, and what is overkill, b
I think, placing the wireless passwords out of the keyring is not the
ideal solution, because the keyring is being used for other passwords as
well. (Like Samba shares or various instant messengers.) So just dealing
with network-manager decreases security but doesn't solve the problem at
all.
If y
I've also experienced this behaviour. But typing the password blindly
into this partial unlock dialog does in fact unlock the screen.
--
gnome-screensaver locks up randomly when unlocking screen
https://bugs.launchpad.net/bugs/183486
You received this bug notification because you are a member of
A quick workaround (if your home partition lives on an ext2/3
filesystem) is to use sudo chattr +i .thinkfinger.bir.
--
Fingerprints stored in unsafe location
https://bugs.launchpad.net/bugs/235297
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
** Changed in: thinkfinger (Ubuntu)
Status: New => Confirmed
--
README.Debian contains error
https://bugs.launchpad.net/bugs/243339
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubu
** Changed in: thinkfinger (Ubuntu)
Status: New => Confirmed
--
thinkfinger-tools acquire fails on usb_bulk_read error
https://bugs.launchpad.net/bugs/214404
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing
*** This bug is a duplicate of bug 243339 ***
https://bugs.launchpad.net/bugs/243339
I've marked this as a duplicate of
https://bugs.launchpad.net/ubuntu/+source/thinkfinger/+bug/243339
although this one is the older bug report. The reason is, that the other
one does already have a patch attac
Public bug reported:
Binary package hint: nautilus
When connecting to a remote server via the ssh protocol, nautilus
doesn't recognize group write permissions on the remote server. I
noticed this when I wanted to create a new folder in a remote /var/www
directory with group write permissions for
That's ok for me, of course.
--
no run as root in menu in hardy
https://bugs.launchpad.net/bugs/209084
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mai
> su-to-root "will automatically call either gksu (default) or kdesu
(when being launched under KDE) for better integration into the running
desktop environment."
Yes, I know that. I've just put it on top of my selection, because it
tries to detect the currently running desktop environment, and so
*** This bug is a duplicate of bug 198884 ***
https://bugs.launchpad.net/bugs/198884
** This bug has been marked a duplicate of bug 198884
Wireshark 0.99.7 halted in Hardy
--
wireshark grey window since Hardy
https://bugs.launchpad.net/bugs/64
You received this bug notification becaus
*** This bug is a duplicate of bug 209084 ***
https://bugs.launchpad.net/bugs/209084
** This bug has been marked a duplicate of bug 209084
no run as root in menu in hardy
--
wireshark capture interfaces woks only with sudo
https://bugs.launchpad.net/bugs/236346
You received this bug notif
So my proposal is this:
The attachment is supposed to be installed as /usr/bin/wireshark-root.
It tries su-to-root, gksu and kdesudo in this order, (although I don't
know if I got the options for kdesudo right), and when nothing's there
it opens x-terminal-emulator with plain sudo.
wireshark-root
@Hewus:
If menu will be the standard for that in the future, say in Intrepid, then it
will certainly be o.k, and maybe a better solution than now. But currently,
this would be a weird exception. Everything else uses gksu in their .desktop
files on Ubuntu, be it wireshark-comparable tools like et
I think, this thread may be of interest:
http://www.mail-archive.com/debian-
[EMAIL PROTECTED]/msg20136.html
--
no run as root in menu in hardy
https://bugs.launchpad.net/bugs/209084
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
u
> If we are replacing gksu with menu, then menu should probably be a
recommended package instead of a dependency.
I think, I don't like that very much. I, for example, regularly disable
automatic installation of recommended packages, and I'm sure I'm not
alone. This is in this case no problem, bec
@LimCore:
No, I didn't. As it's written in the corresponding KDE bug there are two ways
to send mail to random people you meet on the internet. Either you sign their
keys without actually verifying their identity, or you set the trust level to
"ultimate" although you'd really trust them just par
I can confirm this, too. Urlsnarf works, though.
--
does not show any fetched data
https://bugs.launchpad.net/bugs/120867
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
htt
Public bug reported:
Binary package hint: nfs-user-server
Two users in the German Loco-Forum ubuntuusers.de have reported, that
the nfs-user-server has truncated files to 0 bytes after they upgraded
from Feisty to Gutsy.
Both say that NFS worked fine under Feisty and this phenomenon is new
after
I can confirm this behaviour for Feisty and Gutsy. I didn't test other
Ubuntu releases.
--
Properties window weirdness
https://bugs.launchpad.net/bugs/116939
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.
--
ubuntu-bugs mailing l
> It would be great if the patch could get improved and applied for
Kubuntu.
I second that. The point of the KDE developers is really annoying:
Because there is the small possibillity of a mitm-attack you shouldn't
be allowed to send encrypted mail to keys you didn't sign, but if you
really want t
Although I can't reproduce this myself, but there are several users in
the German community forum who have the same problem:
http://forum.ubuntuusers.de/topic/94206/ (Language: German)
http://forum.ubuntuusers.de/topic/99484/ (Language: German)
Some of them use gdm and others kdm.
** Changed in:
*** This bug is a duplicate of bug 119259 ***
https://bugs.launchpad.net/bugs/119259
** This bug has been marked a duplicate of bug 119259
Numlock turns off at login and misses first keystroke
--
First Xubuntu login always fail
https://bugs.launchpad.net/bugs/115787
You received this bug
Is there any reason, why these files are created by tcpd and not by
libwrap0? I find it a little bit weird to install the tcpd-packet by
default just because other packets - which depend on libwrap0 - need
these two little text files.
--
Feisty - /etc/hosts.allow and /etc/hosts.deny are missing
h
smaug said:
>>oh - that was what confused me in the first post ... running syslogd as root
>>may be a potential security issue, is it ?<<
I think it is. I'll flag this as a security bug.
** This bug has been flagged as a security issue
** Changed in: sysklogd (Ubuntu)
Status: Unconfirmed
*** This bug is a duplicate of bug 103232 ***
https://bugs.launchpad.net/bugs/103232
Thank you for the information. I've marked this one as duplicate.
** This bug has been marked a duplicate of bug 103232
sysklogd init-script arguments
--
remote syslog in feisty not working - syslogd run
https://bugzilla.mozilla.org/show_bug.cgi?id=383841
--
Weak default authentication mode
https://bugs.launchpad.net/bugs/119358
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.co
I've got version 1.5.0.12-0ubuntu0.7.04 from the feisty repos here.
Although the password dialog is not part of the wizard, i am not asked
if i want to start downloading mail, but the wizard ends and the
password dialog opens immediately.
Anyway - that's not my main point. It is that Thunderbird
Public bug reported:
Binary package hint: mozilla-thunderbird
When starting Thunderbird the first time, the account wizard neither
asks for nor provides by default any attempt to secure the password.
SSL/TLS is off and so is "secure authentication" via CRAM-MD5 or such.
So the password is sent in
The reason is, that in /etc/init.d/sysklogd /etc/default/syslogd is
sourced after the definition of SYSLOGD, overwriting it. So
/etc/default/syslogd is the place where the "-r" belongs.
But apart from that, this is a real security bug, because it causes to
start syslogd as root and not as user sys
Just backed up my theory a little bit.
I dumped swapon -s into a file near the end of checkroot.sh and
confirmed that there was only one swap entry (/dev/sda9) at this time.
When the system was fully up and running, there were the two entrys with
and without 'mapper' again.
--
2 swap partitions
Replacing the UUID in the fstab with the "real" devicename รก la
/dev/sda2 fixes this problem for me, too.
The swapon command is called twice during the boot process. Once in
checkroot.sh and once in mountall.sh, the latter because:
# Execute swapon command again, in case we want to swap t
48 matches
Mail list logo