** Changed in: udisks
Importance: Unknown => High
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/556651
Title:
publicly exports dm key information
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.u
** Changed in: udisks
Importance: High => Unknown
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/556651
Title:
publicly exports dm key information
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.u
Be careful : with the new update of udisks version 1.0.1-1ubuntu it is
impossible to read an internal or usb floppy. The solution is to
downgrade udisks to 1.0.1-build1 as I explain here in detail :
http://users.skynet.be/linux-rixensart/1_suite.html#floppy
Lucien
--
publicly exports dm key inf
** Changed in: udisks (Debian)
Status: Confirmed => Fix Released
--
publicly exports dm key information
https://bugs.launchpad.net/bugs/556651
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bug
** Branch linked: lp:ubuntu/udisks
--
publicly exports dm key information
https://bugs.launchpad.net/bugs/556651
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubun
This bug was fixed in the package udisks - 1.0.1-1
---
udisks (1.0.1-1) unstable; urgency=high
Urgency high because of security bug fix.
[ Michael Biebl ]
* Build against parted 2.2. (Closes: #574908)
* debian/control
- Add dependency on dbus.
[ Martin Pitt ]
* New u
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-1149
--
publicly exports dm key information
https://bugs.launchpad.net/bugs/556651
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-
** Changed in: udisks (Debian)
Status: New => Confirmed
--
publicly exports dm key information
https://bugs.launchpad.net/bugs/556651
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.u
$ sudo src/devkit-disks-dm-export 252 0
DKD_DM_NAME=udisks-luks-uuid-fb577f21-6a7e-4891-84d6-dc369073ac34-uid1000
DKD_DM_UUID=CRYPT-LUKS1-fb577f216a7e489184d6dc369073ac34-udisks-luks-uuid-fb577f21-6a7e-4891-84d6-dc369073ac34-uid1000
DKD_DM_STATE=ACTIVE
DKD_DM_TABLE_STATE=LIVE
DKD_DM_OPENCOUNT=1
DKD
Ah, *phew*, I checked karmic, and its dk-disks version is old enough to
not yet export TARGETS_PARAMS at all. ./src/devkit-disks-dm-export.c
just entirely ignores the "params" return value.
** Changed in: devicekit-disks (Ubuntu Karmic)
Status: In Progress => Invalid
** Changed in: devicek
This also affects devicekit-disks in karmic. Earlier Ubuntu releases
used hal and did not have {u,dk}-disks yet.
** Changed in: devicekit-disks (Ubuntu Karmic)
Importance: Undecided => High
** Changed in: devicekit-disks (Ubuntu Karmic)
Status: New => In Progress
** Changed in: devicek
Upstream said someone already requested a CVE for this.
** Also affects: devicekit-disks (Ubuntu)
Importance: Undecided
Status: New
** Also affects: devicekit-disks (Ubuntu Karmic)
Importance: Undecided
Status: New
** Also affects: udisks (Ubuntu Karmic)
Importance: Undeci
I fixed this upstream in
http://cgit.freedesktop.org/udisks/commit/?id=0fcc7cb3b66f23fac53ae08647aa0007a2bd56c4
** Changed in: udisks (Ubuntu Lucid)
Status: In Progress => Fix Committed
--
publicly exports dm key information
https://bugs.launchpad.net/bugs/556651
You received this bug not
** Changed in: udisks (Debian)
Status: Unknown => New
--
publicly exports dm key information
https://bugs.launchpad.net/bugs/556651
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubu
udisks only needs UDISKS_DM_TARGETS_PARAMS for UDISKS_DM_TARGETS_TYPE
== "linear", and is only interested in the major/minor of the device and
the offset.
So we should drop the key information for UDISKS_DM_TARGETS_TYPE ==
"crypt" or only explicitly set major/minor/offset, and/or not set
UDISKS_D
15 matches
Mail list logo