I'm still unable to update production servers from 19.10 (eoan) because
of the lack of freeipa-server. Now that 19.10 has been EOL for a while
now without resolving this I'll be giving up on Ubuntu and switching
these servers to Fedora.
--
You received this bug notification because you are a
This bug is due to a double-free in source3/librpc/crypto/gse.c where
gse_ctx->k5ctx is freed twice if gse_context_init fails and the err_out
path is taken.
The beginning of gse_context_init calls talloc_set_destructor to call
gse_context_destructor:
talloc_set_destructor((TALLOC_CTX
When attempting to decrypt a message, these messages show up in syslog:
Jun 8 15:55:29 wopr systemd[2245]: Started GnuPG cryptographic agent and
passphrase cache.
Jun 8 15:55:29 wopr gpg-agent[25712]: gpg-agent (GnuPG) 2.2.4 starting in
supervised mode.
Jun 8 15:55:29 wopr gpg-agent[25712]:
-22
/home/jesse/.gnupg/pubring.kbx
--
pub rsa2048 2018-02-22 [SC] [expires: 2019-02-22]
...
uid [ultimate] Jesse Michael <...@...>
uid [ultimate] Jesse Michael <...@...>
sub rsa2048 2018-02-22 [E] [expires: 2019-02-22]
pub rsa
To add a little more information, the steam installation fails with this
"Steam License Agreement was DECLINED." error message even if you select
"I AGREE" if you're installing steam at the same time as steamcmd or
have steamcmd already installed. i.e. "apt install steam steamcmd".
If you purge
Marc, this bug still happens in Xenial. The script fails claiming that
the license agreement was declined no matter what you do, not just when
you actually decline the license.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
This crash is still happening on a fully-updated 14.10--
# lsb_release -rd
Description:Ubuntu 14.10
Release:14.10
# uname -a
Linux chernobyl 3.16.0-30-generic #40-Ubuntu SMP Mon Jan 12 22:06:37 UTC 2015
x86_64 x86_64 x86_64 GNU/Linux
# dpkg-query -l ushare libdlna0
It's kind of depressing that this bug is still not fixed four and a half
years later in trusty.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/446657
Title:
Bluetooth's on/off status doesn't update
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/938415
Title:
bluetooth-applet does not preserve enabled/disabled state across
reboot
To manage notifications about this bug go to:
Public bug reported:
I have multiple computers that I very rarely want to use bluetooth with
and no matter how many times I select Disable Bluetooth from the
Bluetooth applet, it always re-enables it upon reboot.
ProblemType: Bug
DistroRelease: Ubuntu 11.10
Package: gnome-bluetooth
The information leakage may be very limited in scope, but it's certainly
a security vulnerability.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/901077
Title:
Information leakage in Unity when
I haven't run into this when suspending, but often when closing tabs,
firefox will go unresponsive and grey out for a while before eventually
coming back.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Public bug reported:
I was minding my own business browsing the web using a fully up-to-date
install of Oneiric when I got an Oops reporting that kswapd0 had died in
shmem_writepage.
ProblemType: Bug
DistroRelease: Ubuntu 11.10
Package: linux-image-3.0.0-12-generic 3.0.0-12.20
** Attachment added: relevant oops report from the system logs
https://bugs.launchpad.net/bugs/880245/+attachment/2567751/+files/shmem_writepage-oops.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Attachment added: wtf-shmem_writepage.jpg
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/880245/+attachment/2567772/+files/wtf-shmem_writepage.jpg
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Public bug reported:
I upgraded to Oneiric recently and installed gnome-shell because unity
still has some pretty serious functionality problems, but discovered
that the gnome-shell session menu doesn't have a Hibernate option, just
Suspend.
I never use suspend, but use hibernate at least twice
This just happened to me in Natty.
I opened a pwsafe.dat file I'd copied from a different system, changed
several passwords, and when I hit save, MyPasswordSafe immediately
crashed, losing the changes I'd made.
I had accidentally copied the files to my desktop as root instead of the
user I was
Just installed the version from the ppa. I'll keep an eye on and it and
see if it dies again.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/713954
Title:
privoxy crashed with SIGSEGV in
I haven't noticed a particular pattern. All my browsing traffic goes through
privoxy and every once in a while, I notice that
connections are being refused and that the privoxy daemon has crashed.
I haven't been able to narrow down what specific type of traffic is
causing the problem yet.
--
I'm running into this also on a Natty box.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/615987
Title:
strings aborts on jpeg file
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
I see this also sometimes with--
00:02.0 VGA compatible controller: Intel Corporation Mobile 945GME
Express Integrated Graphics Controller (rev 03)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Public bug reported:
Binary package hint: pm-utils
Recently, my EeePc 1005HA running the latest version of Natty lost the
ability to hibernate. The hibernate option was removed from the
shutdown menu and pm-hibernate and pm-suspend-hybrid don't do anything
now. pm-suspend still suspends the
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/710796
Title:
hibernate no longer works on natty
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
I'm running into this bug also. I haven't done any ipv6 configuration
of any kind, but I sometimes run into apt failing because of this error.
Running the avahi-browse command line listed above multiple times in a
row with maybe a second or two between each run resulted in the
following output--
This feature is especially aggravating when using the Netboot/Unity
interface, as it takes up a significant amount of space in the left dock
bar and is completely useless for my use cases.
I do a lot of bzr development, but I've never had any use for an
additional status popup telling me what's
I'm guessing this won't fix the problem entirely, but when I try to play
relatively large videos like the 1024x436 version of that Sintel movie,
I'm getting this SEGV--
VO: [vdpau] 1024x436 = 1024x436 Planar YV12
[vdpau] Error when calling vdp_output_surface_create: A catch-all error, used
when
Public bug reported:
Binary package hint: apparmor
When aa-logprof runs into log messages that don't have denied or
requested masks, like the following status message, it ends up trying to
perform a string operation on an undefined variable which causes
warnings to be printed to the console.
** Patch added: avoid doing string operations on $rmask or $dmask when they're
undefined
https://bugs.launchpad.net/bugs/652674/+attachment/1661041/+files/rmask-dmask.diff
** Attachment added: ApparmorPackages.txt
** Attachment added: Dependencies.txt
https://bugs.launchpad.net/bugs/634388/+attachment/1562180/+files/Dependencies.txt
** Attachment added: SSHDConfig.txt
https://bugs.launchpad.net/bugs/634388/+attachment/1562181/+files/SSHDConfig.txt
--
/etc/init.d/ssh stop doesn't stop sshd
Public bug reported:
Running /etc/init.d/ssh stop gives the following message, but doesn't
successfully stop the sshd daemon from running--
je...@cthulhu:~$ sudo /etc/init.d/ssh stop
* Stopping OpenBSD Secure Shell server sshd
...done.
je...@cthulhu:~$
I believe this is because sshd was
** Attachment added: Dependencies.txt
https://bugs.launchpad.net/bugs/634388/+attachment/1562180/+files/Dependencies.txt
** Attachment added: SSHDConfig.txt
https://bugs.launchpad.net/bugs/634388/+attachment/1562181/+files/SSHDConfig.txt
--
/etc/init.d/ssh stop doesn't stop sshd
I was getting lots of these errors showing up in my kernel log also, so
I've switched back to an unencrypted homedir on my laptop for now. I
don't know if I've had any file corruption due to this problem, but it
was making me pretty nervous.
--
Valid eCryptfs headers not found in file header
I've run into this bug a number of times also, but it's happened for me
due to permission errors rather than my ipod running out of space.
Often when I plug in in my ipod, it gets mounted as root:root instead of
my desktop user and if I forget about that and try to copy stuff to the
ipod, I get a
I think I'm running into this bug also.
I have two encrypted partitions, one on a non-removable drive and one on
a firewire drive. GDM started up without waiting for me to enter any
passwords, and I now have the following showing up in pstree--
I should also point out that the encrypted partition on the non-
removable drive is currently set to noauto in fstab, but it still
seems to be stalling the boot process to some degree.
--
cryptsetup init scripts are redundant and can break the boot
https://bugs.launchpad.net/bugs/473615
You
Public bug reported:
Binary package hint: xserver-xorg-video-intel
I was adjusting components in the eagle pcb layout tool when Xorg
crashed on me with the following backtrace in Xorg.0.log.old:
Backtrace:
0: /usr/bin/X(xorg_backtrace+0x3b) [0x8133d6b]
1: /usr/bin/X(xf86SigHandler+0x55)
** Attachment added: BootDmesg.txt
http://launchpadlibrarian.net/36286768/BootDmesg.txt
** Attachment added: CurrentDmesg.gz
http://launchpadlibrarian.net/36286769/CurrentDmesg.gz
** Attachment added: Dependencies.txt
http://launchpadlibrarian.net/36286770/Dependencies.txt
**
linux-backports-modules-wireless-karmic-generic has been a lot more
stable for me as well.
I've had a few of these messages show up in my dmesg since I suspended
and resumed 7 hours or so ago, but haven't had any drop/reassociate
cycles at all in that time--
[61982.000897] ath9k: DMA failed to
I've also noticed several of these errors showing up, but haven't been
able to nail down what's triggering them yet:
Nov 19 19:54:35 box kernel: [621999.065176] ecryptfs_read_lower: octets_read =
[-4]; expected [4096]
Nov 19 19:54:35 box kernel: [621999.065186] ecryptfs_decrypt_page: Error
I tried out the 75_ath9k-1005ha-reload file and have had 17
disassociate/reassociate cycles in the last hour and 15 minutes since I
suspended and resumed with that file in /etc/pm/sleep.d/.
My wap is about 10 feet away from me through a single lath-and-plaster
interior wall and currently is
I haven't found any filesystem data errors yet. I just installed the
latest netbook remix on a brand-new Asus 1005HA a few days ago and set
my home directory be to encrypted during the installation.
I don't have very many files in my home directory yet. Primarily just
25M or so of bzr/svn
Public bug reported:
Binary package hint: ecryptfs-utils
My dmesg is getting spammed with this message--
[15161.939753] ecryptfs_lookup: lookup_one_len() returned [-36] on lower_dentry
=
** Attachment added: Dependencies.txt
http://launchpadlibrarian.net/35735687/Dependencies.txt
--
ecryptfs_lookup: lookup_one_len() returned [-36] on lower_dentry = [\\\
https://bugs.launchpad.net/bugs/483364
You received this bug notification because you are a member of Ubuntu
Bugs,
AplayDevices:
List of PLAYBACK Hardware Devices
card 0: Intel [HDA Intel], device 0: ALC269 Analog [ALC269 Analog]
Subdevices: 1/1
Subdevice #0: subdevice #0
Architecture: i386
ArecordDevices:
List of CAPTURE Hardware Devices
card 0: Intel [HDA Intel], device 0:
** Attachment added: AlsaDevices.txt
http://launchpadlibrarian.net/35737506/AlsaDevices.txt
--
ecryptfs_lookup: lookup_one_len() returned [-36] on lower_dentry = [\\\
https://bugs.launchpad.net/bugs/483364
You received this bug notification because you are a member of Ubuntu
Bugs, which
** Attachment added: BootDmesg.txt
http://launchpadlibrarian.net/35737507/BootDmesg.txt
--
ecryptfs_lookup: lookup_one_len() returned [-36] on lower_dentry = [\\\
https://bugs.launchpad.net/bugs/483364
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Attachment added: Card0.Codecs.codec.0.txt
http://launchpadlibrarian.net/35737510/Card0.Codecs.codec.0.txt
--
ecryptfs_lookup: lookup_one_len() returned [-36] on lower_dentry = [\\\
https://bugs.launchpad.net/bugs/483364
You received this bug notification because you are a member of
** Attachment added: Card0.Amixer.values.txt
http://launchpadlibrarian.net/35737508/Card0.Amixer.values.txt
--
ecryptfs_lookup: lookup_one_len() returned [-36] on lower_dentry = [\\\
https://bugs.launchpad.net/bugs/483364
You received this bug notification because you are a member of
** Attachment added: CurrentDmesg.txt
http://launchpadlibrarian.net/35737511/CurrentDmesg.txt
--
ecryptfs_lookup: lookup_one_len() returned [-36] on lower_dentry = [\\\
https://bugs.launchpad.net/bugs/483364
You received this bug notification because you are a member of Ubuntu
Bugs,
** Attachment added: Dependencies.txt
http://launchpadlibrarian.net/35737512/Dependencies.txt
--
ecryptfs_lookup: lookup_one_len() returned [-36] on lower_dentry = [\\\
https://bugs.launchpad.net/bugs/483364
You received this bug notification because you are a member of Ubuntu
Bugs,
** Attachment added: Lspci.txt
http://launchpadlibrarian.net/35737520/Lspci.txt
--
ecryptfs_lookup: lookup_one_len() returned [-36] on lower_dentry = [\\\
https://bugs.launchpad.net/bugs/483364
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Attachment added: PciMultimedia.txt
http://launchpadlibrarian.net/35737522/PciMultimedia.txt
--
ecryptfs_lookup: lookup_one_len() returned [-36] on lower_dentry = [\\\
https://bugs.launchpad.net/bugs/483364
You received this bug notification because you are a member of Ubuntu
Bugs,
** Attachment added: IwConfig.txt
http://launchpadlibrarian.net/35737519/IwConfig.txt
--
ecryptfs_lookup: lookup_one_len() returned [-36] on lower_dentry = [\\\
https://bugs.launchpad.net/bugs/483364
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Attachment added: Lsusb.txt
http://launchpadlibrarian.net/35737521/Lsusb.txt
--
ecryptfs_lookup: lookup_one_len() returned [-36] on lower_dentry = [\\\
https://bugs.launchpad.net/bugs/483364
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Attachment added: ProcCpuinfo.txt
http://launchpadlibrarian.net/35737524/ProcCpuinfo.txt
--
ecryptfs_lookup: lookup_one_len() returned [-36] on lower_dentry = [\\\
https://bugs.launchpad.net/bugs/483364
You received this bug notification because you are a member of Ubuntu
Bugs, which
** Attachment added: ProcInterrupts.txt
http://launchpadlibrarian.net/35737526/ProcInterrupts.txt
--
ecryptfs_lookup: lookup_one_len() returned [-36] on lower_dentry = [\\\
https://bugs.launchpad.net/bugs/483364
You received this bug notification because you are a member of Ubuntu
Bugs,
** Attachment added: ProcModules.txt
http://launchpadlibrarian.net/35737527/ProcModules.txt
--
ecryptfs_lookup: lookup_one_len() returned [-36] on lower_dentry = [\\\
https://bugs.launchpad.net/bugs/483364
You received this bug notification because you are a member of Ubuntu
Bugs, which
** Attachment added: RfKill.txt
http://launchpadlibrarian.net/35737528/RfKill.txt
--
ecryptfs_lookup: lookup_one_len() returned [-36] on lower_dentry = [\\\
https://bugs.launchpad.net/bugs/483364
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Attachment added: UdevDb.txt
http://launchpadlibrarian.net/35737529/UdevDb.txt
--
ecryptfs_lookup: lookup_one_len() returned [-36] on lower_dentry = [\\\
https://bugs.launchpad.net/bugs/483364
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Attachment added: UdevLog.txt
http://launchpadlibrarian.net/35737532/UdevLog.txt
--
ecryptfs_lookup: lookup_one_len() returned [-36] on lower_dentry = [\\\
https://bugs.launchpad.net/bugs/483364
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Attachment added: WifiSyslog.gz
http://launchpadlibrarian.net/35737533/WifiSyslog.gz
** Tags added: apport-collected
--
ecryptfs_lookup: lookup_one_len() returned [-36] on lower_dentry = [\\\
https://bugs.launchpad.net/bugs/483364
You received this bug notification because you are a
This bug hit me pretty badly tonight when I tried to delete around 250
files from my ipod and immediately copy another 350 files onto it when
the filesystem had been inadvertently mounted as root instead of my
user.
As far as I can tell, rhythmbox tried to pop up a permission denied
dialog for
It could be my imagination, but it seemed to take more effort to get it
to fail with the version of the driver from the linux-backports-modules-
wireless-karmic-generic package, but I still eventually ended up with
the attached dmesg log.
** Attachment added: dmesg log from
Even with only a 50G / partition, I was convinced that my laptop was
hanging and it was only on the third reboot when I tried booting up in
recovery mode that I figured out it was because it was fscking because
it'd reached the mount limit. And I've been using Linux primarily for
over a decade
** Attachment added: BootDmesg.txt
http://launchpadlibrarian.net/33806522/BootDmesg.txt
** Attachment added: CurrentDmesg.txt
http://launchpadlibrarian.net/33806523/CurrentDmesg.txt
** Attachment added: Lspci.txt
http://launchpadlibrarian.net/33806524/Lspci.txt
** Attachment added:
Public bug reported:
Binary package hint: qemu-kvm
If kvm is started using two separate -net user,hostfwd=forwarding
rule arguments to forward ports from the host to the client, it won't
complain, but will return a connection refused error and hang at 100%
cpu when trying to connect to either
I'm seeing this also. When doing heavy network access, iwlagn will
start dumping backtraces and errors about not being able to allocate
SKBs.
My network still seems to be working, but things seem slower than normal
after that happens.
--
iwlagn :03:00.0: Can not allocate SKB buffers
I had been running 2.6.31-13-generic also, but updated to the latest
kernel available as I'm typing this (2.6.31-14-generic) and ran into the
same problem.
** Attachment added: dmesg log from bootup through iwlagn errors on
2.6.31-14-generic
I certainly understand the offered rationale for the decision to make
the system icons greyscale, I just think the decision is painfully bad.
In addition to just being ugly, the loss of color significantly
interferes with the usability of the desktop for me on a daily basis
because it takes me
Is the fix actually out to the mirrors? I ran into this bug and was
still getting hit by it even after updating and rebooting less than an
hour ago.
--
can't write mtab when /etc/mtab~ exists
https://bugs.launchpad.net/bugs/431865
You received this bug notification because you are a member of
Nevermind, I didn't realize there was a difference between Fix
Committed and Published.
--
can't write mtab when /etc/mtab~ exists
https://bugs.launchpad.net/bugs/431865
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs
** Attachment added: Dependencies.txt
http://launchpadlibrarian.net/27246571/Dependencies.txt
--
liferea has two top-level menus with same accelerator key
https://bugs.launchpad.net/bugs/381406
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
Public bug reported:
Binary package hint: liferea
Liferea has two top-level menus that both use S as the accelerator
key: Subscriptions and Search.
Because of this, when the user hits alt-S to select a menu item using
the keyboard, they only have a 50% chance of having the right menu
selected
Here's a screenshot showing off the duplicate menus/accelerators.
** Attachment added: liferea.png
http://launchpadlibrarian.net/27246587/liferea.png
--
liferea has two top-level menus with same accelerator key
https://bugs.launchpad.net/bugs/381406
You received this bug notification because
Public bug reported:
The Alps touchpad driver (drivers/input/mouse/alps.c) is currently
hardcoded to enable hardware tapping when it initializes the hardware
in alps_hw_init()--
if (alps_tap_mode(psmouse, 1)) {
printk(KERN_WARNING alps.c: Failed to enable hardware
** Attachment added: BootDmesg.txt
http://launchpadlibrarian.net/26664787/BootDmesg.txt
** Attachment added: CurrentDmesg.txt
http://launchpadlibrarian.net/26664788/CurrentDmesg.txt
** Attachment added: Dependencies.txt
http://launchpadlibrarian.net/26664789/Dependencies.txt
**
I've had this happen to me twice now on Intrepid with 2.6.27-11-generic.
I'm also on an x86_64 box.
--
iwlagn km shuts down/gets tainted randomly
https://bugs.launchpad.net/bugs/329970
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
It's not fatal for me and I can rmmod and modprobe iwlagn to
successfully reassociate with the network, but the fundamental problem
with not being able to allocate SKB buffers is still there so the
problem happens again after a while.
Here's my full dmesg from bootup including three of these
I grabbed linux-image-2.6.27-11-generic_2.6.27-11.27_amd64.deb and tried
booting up without the blacklist isp1670 entry.
I get these entries in syslog, but my laptop booted up normally
otherwise, so I'd call it a success--
[ 18.099400] isp1760 :03:04.0: PCI INT A - GSI 16 (level, low) -
Public bug reported:
I'm running into a regression between 2.6.27-9 and 2.6.29-11 where
loading the isp1760 driver during bootup causes a kernel oops in
isp1761_pci_probe. This prevents my laptop from continuing to boot up.
Adding blacklist isp1761 to my /etc/modprobe.d/blacklist file allows
me
** Attachment added: 1st part of kernel oops
http://launchpadlibrarian.net/21750364/img_4649.jpg
--
[regression] modprobe isp1760 triggers kernel oops during bootup in 2.6.27-11
https://bugs.launchpad.net/bugs/322553
You received this bug notification because you are a member of Ubuntu
Bugs,
** Attachment added: 2nd part of kernel oops
http://launchpadlibrarian.net/21750380/img_4650.jpg
--
[regression] modprobe isp1760 triggers kernel oops during bootup in 2.6.27-11
https://bugs.launchpad.net/bugs/322553
You received this bug notification because you are a member of Ubuntu
Bugs,
** Attachment added: 3rd part of kernel oops
http://launchpadlibrarian.net/21750394/img_4651.jpg
--
[regression] modprobe isp1760 triggers kernel oops during bootup in 2.6.27-11
https://bugs.launchpad.net/bugs/322553
You received this bug notification because you are a member of Ubuntu
Bugs,
** Attachment added: 4th part of kernel oops
http://launchpadlibrarian.net/21750426/img_4652.jpg
--
[regression] modprobe isp1760 triggers kernel oops during bootup in 2.6.27-11
https://bugs.launchpad.net/bugs/322553
You received this bug notification because you are a member of Ubuntu
Bugs,
** Attachment added: 5th part of kernel oops
http://launchpadlibrarian.net/21750430/img_4653.jpg
--
[regression] modprobe isp1760 triggers kernel oops during bootup in 2.6.27-11
https://bugs.launchpad.net/bugs/322553
You received this bug notification because you are a member of Ubuntu
Bugs,
** Attachment added: bootup never gets further than this point
http://launchpadlibrarian.net/21750435/img_4654.jpg
--
[regression] modprobe isp1760 triggers kernel oops during bootup in 2.6.27-11
https://bugs.launchpad.net/bugs/322553
You received this bug notification because you are a
I ran into the same issue after I'd changed the default entry to boot to
saved, uncommented the savedefault=true line, and added the
savedefault option to several kernel entries.
When I upgraded to the new kernel, I got the dialog asking what I wanted
to do about the changes to the menu.lst file
I can't duplicate this in a gnome-terminal, but if I ssh localhost and
run it that way, it hangs for me with 100% cpu also.
Here's the stack trace from when I attached to the process with gdb:
#0 0x080943f0 in termsig_sighandler ()
#1 signal handler called
#2 0x0806edda in dispose_word ()
#3
I think this patch might fix the problem. The format of audit messages
that are redirected to syslog because auditd isn't running changed
between Hardy and Intrepid and now have the type= field before the
audit tag like--
Nov 1 22:24:43 box kernel: [ 158.113592] type=1503
I believe the root cause of this problem is that the lex grammar in
libapparmor used for parsing log messages is not robust enough.
I spent a bit of time instrumenting logprof and found that the garbage
characters are printed in the middle of when it calls
LibAppArmor::parse_record. This
It looks like the format for audit messages that show up in
/var/log/messages when auditd is not running changed between Hardy and
Intrepid.
The type= part of the message was after the
audit(NN.NNN:NN): part in Hardy, but before it in Intrepid and
that's likely causing the log parsing
*** This bug is a duplicate of bug 227934 ***
https://bugs.launchpad.net/bugs/227934
It looks like do_popup expects an event parameter to be passed to it,
but on_vte_popup_menu is ignoring the event parameter that's being
passed to it (unlike the other on_vte_event handlers).
Here's an
Actually, AA already has a way to specify that LD_PRELOAD (and a number
of other env variables like that) should be cleared on exec.
It's definitely non-intuitive, but that's the distinction between Px and
px (and Ux and ux) in the profile language.
When a Px rule is used to grant execute
Granting the dac_override capability in an AA profile doesn't give away
permission to access things not listed explicitly in the profile.
It gives root the ability to read and write files that it does not have
group or other permission to access (e.g. user foo has a file named
/home/foo/bar.txt
Hehe, thanks. All of the above, really. :) Generally, the idea is
that if the app processes untrusted data, it should be wrapped in a
profile to limit the scope of the damage that can be done if the app
contains an unknown exploitable vulnerability.
We've mostly targetted network services and
That's for sysv shared memory segments. You should be able to create a
rule using only /SYSV* rw,.
We're planning on mediating IPC better in the future, but that's not
done yet.
Thanks for working on the profile. :)
--
Add Rhythmbox AppArmor Profile
https://bugs.launchpad.net/bugs/129145
You
96 matches
Mail list logo