Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to nautilus in Ubuntu.
https://bugs.launchpad.net/bugs/1998060
Title:
CVE-2022-37290: Pasted zip archive/invalid file
** Package changed: gnome-screensaver (Ubuntu) => gnome-shell (Ubuntu)
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-shell in Ubuntu.
https://bugs.launchpad.
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to nautilus in Ubuntu.
https://bugs.launchpad.net/bugs/1982572
Title:
nautilus crashes with SIGSEV in g_utf8_validate(
This seems to have been reported in
https://gitlab.gnome.org/GNOME/gnome-settings-daemon/-/issues/634 and
addressed in https://gitlab.gnome.org/GNOME/gnome-settings-
daemon/-/merge_requests/275 ; given that, I am making this bug report
public. Thanks!
** Bug watch added: gitlab.gnome.org/GNOME/gno
Thanks for reporting this issue. I'm opening up it publicly since it
would be useful for the people who work on the installer to see this.
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, w
** Package changed: ubuntu => gnome-shell (Ubuntu)
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-shell in Ubuntu.
https://bugs.launchpad.net/bugs/1972812
Ti
Hi, yes, from the Ubuntu Security team's perspective, this should go to
the security pocket.
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-control-center in Ubuntu.
https://bugs.launchpad.net/bugs/1969619
Title:
RDP Sharing
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Changed in: gdm3 (Ubuntu)
Status: New => Incomplete
** Changed in: gnome-shell (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-shell in Ubuntu.
https://bugs.launchpad.net/bugs/
Hi Fabio and Joshua, thanks for preparing these updates. I have reviewed
them, adjusted the changelogs slightly, and have uploaded packages to
the ubuntu-security-proposed ppa https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages to make them available for
testing.
Any tes
Thanks, I'm taking a look at these. I've adjusted the versions to
imclude per-release versions, since focal and groovy had the same
version of caribou.
** Changed in: caribou (Ubuntu Focal)
Assignee: Joshua Peisach (itzswirlz) => Steve Beattie (sbeattie)
** Changed in: ca
Thanks for the report. Making this public to get the Desktop team to
take a look at this.
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gdm3 in Ubuntu.
https://bug
Hey Milfred, sorry you are hitting this issue.
What Ubuntu release is this? And can you confirm that the desktop
envirnment you're using is the Ubuntu desktop, and not something else?
Thanks.
** Package changed: ubuntu => gdm3 (Ubuntu)
** Information type changed from Private Security to Public
*** This bug is a duplicate of bug 1532508 ***
https://bugs.launchpad.net/bugs/1532508
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-screensaver in Ubunt
Upstream issue: https://gitlab.gnome.org/GNOME/gnome-autoar/-/issues/7
and associated fix https://gitlab.gnome.org/GNOME/gnome-
autoar/-/commit/adb067e645732fdbe7103516e506d09eb6a54429
Given that this is public upstream, I'm going to open this issue ap as
well.
** Bug watch added: gitlab.gnome.or
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gdm3 in Ubuntu.
https://bugs.launchpad.net/bugs/1910220
Title:
Characters from dead keys shown in plan view in pass
I also hit this again in focal on 2020-06-25, with an update to systemd
245.4-4ubuntu3.1; I had previously updated dbus to 1.12.16-2ubuntu2.1 on
2020-06-17 without event. It's still an issue at least with updates to
systemd in focal.
Similar messages end up in the journal:
Jun 25 13:04:55 kryten
Oh, and I have no crash files in /var/crash/.
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-shell in Ubuntu.
https://bugs.launchpad.net/bugs/1871538
Title:
dbus timeout-ed during an upgrade, taking services down including gd
Hi, I had a similar crash this morning upgrading focal, after trying to
get unattended-upgrades to stop spinning on missing focal-security apt
list files. In this case, I don't use gnome-shell as my desktop
environment, but it still tore down my entire desktop environment and
caused gdm3 to respawn
** Package changed: gnupg2 (Ubuntu) => seahorse (Ubuntu)
** Changed in: seahorse (Ubuntu)
Status: Incomplete => New
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to seahorse in Ubuntu.
https://bugs.launchpad.net/bugs/1841051
Ti
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to evince in Ubuntu.
https://bugs.launchpad.net/bugs/1803059
Title:
Nullpointer dereference
To manage notifications a
** Package changed: ubuntu => gnome-shell (Ubuntu)
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-shell in Ubuntu.
https://bugs.launchpad.net/bugs/1803527
Title:
ub
** Summary changed:
- Bypass Login Screen
+ Bypass Login Screen by replugging in external monitors
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gdm3 in Ubuntu.
h
** Information type changed from Private to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gdm3 in Ubuntu.
https://bugs.launchpad.net/bugs/1699388
Title:
gdm3 crashed with SIGSEGV -- error after login using gdm3 greeter
w
** Package changed: banshee (Ubuntu) => rhythmbox (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to rhythmbox in Ubuntu.
https://bugs.launchpad.net/bugs/1771196
Title:
daap plugin opens port by default
To manage notificatio
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Yes, zesty is affected. artful is not affected, as upstream did not
apply the fix for CVE-2017-183 to trunk, due to the introduction of
using libarchive by default. trusty is also not affected, as the mime
types configure processing is handled differently there.
--
You received this bug notif
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Also affects: systemd (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects: systemd (Ubuntu Yakkety)
Importance: Undecided
Status: Confirmed
** Changed in: systemd (Ubuntu Xenial)
Status: New => Confirmed
--
You received this bug notification because y
** Information type changed from Private to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to rhythmbox in Ubuntu.
https://bugs.launchpad.net/bugs/1545502
Title:
rhythmbox crashed with SIGSEGV in rhythmdb_entry_cache_metadata()
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
AppArmor 2.10 has been released:
https://launchpad.net/apparmor/2.10/2.10
** Changed in: apparmor
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.n
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
*** This bug is a duplicate of bug 1431073 ***
https://bugs.launchpad.net/bugs/1431073
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to nautilus in Ubuntu.
https://bugs.lau
*** This bug is a duplicate of bug 1431121 ***
https://bugs.launchpad.net/bugs/1431121
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to shotwell in Ubuntu.
https://bugs.lau
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-session in Ubuntu.
https://bugs.launchpad.net/bugs/1310003
Title:
The program 'gnome-session-properties' is currently n
*** This bug is a duplicate of bug 403110 ***
https://bugs.launchpad.net/bugs/403110
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a s
Here's a patch to glibc to set the default value of MALLOC_CHECK_ to 1
(from 3). By doing so, the malloc specific error passed to
malloc_printerr() will still be displayed by default, but libc will not
attempt to generate a backtrace, which is what is causing the deadlock
to occur. Even if the dead
Here's a similar debdiff for e-d-s, confirmed to build on i386.
** Patch added: "evolution-data-server_3.10.3-0ubuntu2.debdiff"
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1266492/+attachment/3961568/+files/evolution-data-server_3.10.3-0ubuntu2.debdiff
--
You received this bug no
Unfortunately, the workaround prescribed, adding hardening-wrapper as a
build dependency doesn't always work, and it's not clear why it does
work occasionally. First, in order for hardened-cc to do anything at
all, DEB_BUILD_HARDENING needs to be set, and second, if it detects
'-static' or other po
So it turns out that ld hanging on the backtrace is actually glibc bug
https://sourceware.org/bugzilla/show_bug.cgi?id=16159 getting tickled.
Setting the MALLOC_CHECK_ environment variable causes it not to hang, by
not trying to emit the back trace and deadlocking on reacquiring the
malloc lock:
Attached is a debdiff for this issue and for bug 982619 and bug 1091642
for an SRU for precise. I've confirmed that the package rebuilds
correctly via sbuild and that the result passes the apparmor tests from
lp:qa-regression-testing.
** Patch added: "apparmor_2.7.102-0ubuntu3.8.debdiff"
http
Making this report public since the issue is public elsewhere:
https://bugzilla.gnome.org/show_bug.cgi?id=671537
http://www.openwall.com/lists/oss-security/2012/05/04/4
** Visibility changed to: Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, wh
** Visibility changed to: Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to nautilus in Ubuntu.
https://bugs.launchpad.net/bugs/944178
Title:
nautilus crashed with SIGSEGV in gtk_box_pack()
To manage notifications about this b
** Visibility changed to: Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to nautilus in Ubuntu.
https://bugs.launchpad.net/bugs/929606
Title:
nautilus crashed with SIGSEGV in g_mutex_get_impl()
To manage notifications about th
** Visibility changed to: Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to nautilus in Ubuntu.
https://bugs.launchpad.net/bugs/941086
Title:
nautilus crashed with SIGABRT in __assert_fail_base()
To manage notifications about
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Also noting here that the commit
http://git.gnome.org/browse/empathy/patch/?id=15a4eec2f156c4f60398a9d842279203f475ed89
is needed as well.
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to empathy in Ubuntu.
https://bugs.launchpad.net/bu
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3635
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to empathy in Ubuntu.
https://bugs.launchpad.net/bugs/879301
Title:
HTML injection in nicknames
To manage notif
Thanks for the report! Assigning the task to myself.
** Changed in: empathy (Ubuntu)
Assignee: (unassigned) => Steve Beattie (sbeattie)
** Changed in: empathy (Ubuntu)
Status: New => In Progress
** Changed in: empathy (Ubuntu)
Importance: Undecided => High
--
You rece
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Correcting the package this bug is against from vinagre to gtk-vnc,
since that's where the underlying problem is. Attached is a debdiff
based on the diffs pointed out by Josh Wendell and mccurrly above for a
lucid SRU.
** Patch added: "gtk-vnc_0.3.10-2ubuntu2.1.debdiff"
https://bugs.launchpad.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Attachment removed: "CoreDump.gz"
https://bugs.launchpad.net/ubuntu/+source/gdm/+bug/808900/+attachment/2202538/+files/CoreDump.gz
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gdm in Ubuntu.
https://bugs.launchpad.net/bugs/80
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Your bug report is more likely to get attention if it is made in
English, since this is the language understood by the majority of Ubuntu
developers. Additionally, please only mark a bug as "security" if it
shows evid
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
The following appears to be the cause of the problem:
Richte libpango1.0-common ein (1.28.0-0ubuntu2.2) ...
E: /var/lib/defoma/locked exists.
E: Another defoma process seems running, or you aren't root.
E: If you are root and defoma process isn't running undoubtedly,
E: it is possible that defoma
Sebastian, sorry about using the wrong branch. I've adjusted that and
linked the corrected branch to this bug report. Thanks for the feedback!
** Branch unlinked: lp:~sbeattie/ubuntu/natty/gdm/CVE-2011-0727-lp746053
--
You received this bug notification because you are a member of Ubuntu
Desktop
** Branch linked: lp:~sbeattie/gdm/CVE-2011-0727-lp746053
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gdm in Ubuntu.
https://bugs.launchpad.net/bugs/746053
Title:
Fix privilege escalation vulnerability (CVE-2011-0727)
--
deskt
Olivier, do you have maverick-backports enabled?
2.30.5-0ubuntu4+langfixes~maverick1 isn't in the main archive, but is in
maverick-backports. It looks like the backport for gdm
https://launchpad.net/ubuntu/+source/gdm/2.30.5-0ubuntu4+langfixes~maverick1
did fix issues that sound similar to the prob
*** This bug is a security vulnerability ***
Public security bug reported:
Binary package hint: gdm
Sebastian Krahmer discovered that GDM did not properly drop privileges
when handling the cache directories used to store users' dmrc and
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Changed in: openjdk-6b18 (Ubuntu Hardy)
Status: New => Invalid
** Changed in: openjdk-6b18 (Ubuntu Karmic)
Status: New => Invalid
** Changed in: openjdk-6b18 (Ubuntu Lucid)
Importance: Undecided => Low
** Changed in: openjdk-6b18 (Ubuntu Lucid)
Status: New => Fix Relea
OpenJDK 6 packages were fixed in 6b16-1.6.1-0ubuntu1 and
6b18-1.8.2-4ubuntu1~8.04.1.
** Changed in: openjdk-6 (Ubuntu Hardy)
Importance: Undecided => Low
** Changed in: openjdk-6 (Ubuntu Hardy)
Status: New => Fix Released
** Changed in: openjdk-6 (Ubuntu Karmic)
Status: New => F
Accepting the lcms debdiffs for ubuntu-security.
** Changed in: lcms (Ubuntu Hardy)
Importance: Undecided => Low
** Changed in: lcms (Ubuntu Hardy)
Status: New => In Progress
** Changed in: lcms (Ubuntu Hardy)
Assignee: (unassigned) => Steve Beattie (sbeattie)
** C
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2006-7240
--
Screen not locked on resume from hibernate/suspend
https://bugs.launchpad.net/bugs/42052
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-power-manager in
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-4997
--
Does not lock screen on lid close
https://bugs.launchpad.net/bugs/428115
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is a bug assignee.
--
desktop-bugs mailing list
deskto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Re-opening the lucid task as Treviño (Marco Trevisan) reported that the
proposed version had not fixed the issue, but empathy was moved to
lucid-updates to push out other bugfixes.
** Changed in: empathy (Ubuntu Lucid)
Status: Fix Released => In Progress
--
facebook chat not working on Em
** Changed in: gnome-games (Ubuntu)
Status: Confirmed => Triaged
--
Freecell Solitaire message
https://bugs.launchpad.net/bugs/362231
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is a bug assignee.
--
desktop-bugs mailing list
desktop-bugs@lis
** Attachment added: "gnome-disk-utility-too-large.png"
http://launchpadlibrarian.net/44457665/gnome-disk-utility-too-large.png
** Attachment added: "Dependencies.txt"
http://launchpadlibrarian.net/44457513/Dependencies.txt
--
gnome-disk-utility display doesn't fit in an 800x600 screen un
Public bug reported:
Binary package hint: gnome-disk-utility
gnome-disk-utility display doesn't fit within an 800x600 screen, nor
does it provide scroll bars to move around to see the hidden portions of
its display. See attached screenshot.
ProblemType: Bug
DistroRelease: Ubuntu 10.04
Package: g
** Attachment added: "evolution-setup-too-large.png"
http://launchpadlibrarian.net/44452349/evolution-setup-too-large.png
** Attachment added: "Dependencies.txt"
http://launchpadlibrarian.net/44451870/Dependencies.txt
--
evolution setup assistant doesn't fit on 800x600 screen but could
ht
Public bug reported:
Binary package hint: evolution
Evolution's setup wizard dialog creates it's window too wide to fit on a
800x600 display. See attached screenshot. Going through the dialogs to
setup an account, there's no reason it couldn't fit.
ProblemType: Bug
DistroRelease: Ubuntu 10.04
Pa
I also did not change the gdm theme in karmic. After my initial upgrade
from karmic -> lucid on 2010-03-05, gdm had switched over to the new
theme. At some point shortly thereafter, a dist-upgrade reverted that
change and I was left with the karmic gdm theme.
--
new theme not applied
https://bugs
** Visibility changed to: Public
--
gvfs-gphoto2-volume-monitor crashed with SIGSEGV in
udev_monitor_enable_receiving()
https://bugs.launchpad.net/bugs/540355
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gvfs in ubuntu.
--
desktop-b
People upgrading from hardy to lucid also don't get the indicator
applet; will this fix address that as well, or should I file a separate
bug?
--
the indicator applet should be added back on upgrade to lucid
https://bugs.launchpad.net/bugs/539969
You received this bug notification because you are
** Attachment added: "Dependencies.txt"
http://launchpadlibrarian.net/41141766/Dependencies.txt
** Attachment added: "GConfNonDefault.txt"
http://launchpadlibrarian.net/41141767/GConfNonDefault.txt
--
On hardy->lucid upgrades, gnome-panel still includes fusa-applet alert
https://bugs.laun
Public bug reported:
Binary package hint: gnome-panel
During hardy->lucid upgrades, gnome-panel is still copying fusa-
applet.note to /var/lib/update-notifier/user.d/, despite fusa no longer
being included in the desktop. The user is presented with a dialog
stating:
There is now a combined sta
** Visibility changed to: Public
--
gnome-appearance-properties crashed with SIGSEGV in
g_cclosure_marshal_VOID__BOXED()
https://bugs.launchpad.net/bugs/534362
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-control-center in ubunt
** Visibility changed to: Public
--
gnome-typing-monitor crashed with signal 5 in
dbus_g_connection_register_g_object()
https://bugs.launchpad.net/bugs/522476
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-control-center in ubuntu
** Visibility changed to: Public
--
keyboard application crashed when I clicked apply system wide settings
https://bugs.launchpad.net/bugs/513563
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-control-center in ubuntu.
--
desktop
1 - 100 of 193 matches
Mail list logo