** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to clamav in Ubuntu.
https://bugs.launchpad.net/bugs/1121526
Title:
False positives on trojans (Trojan.Agent-132354)
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to apache2 in Ubuntu.
https://bugs.launchpad.net/bugs/1104049
Title:
/usr/sbin/apachectl privilege escalation
To
** Information type changed from Private Security to Public Security
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to apr in Ubuntu.
https://bugs.launchpad.net/bugs/1152163
Thanks Christian.
I updated the timestamp in the changelog, otherwise looked good to me.
Thanks, this was a beast.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to tomcat7 in Ubuntu.
https://bugs.launchpad.net/bugs/1115053
Title:
Public bug reported:
In today's Raring apt-get dist-upgrade:
Setting up lxc (0.9.0~rc1-0ubuntu1) ...
Installing new version of config file
/etc/apparmor.d/lxc/lxc-default-with-nesting ...
dpkg: warning: lxc: config file '/etc/dnsmasq.d-available/lxc' is a circular
link
(=
Public bug reported:
This trace is from the juju debug-log with the juju ppa on 12.04 LTS,
using the local provider.
In one terminal:
juju destroy-service wordpress
juju destroy-service mysql
In the juju debug-log in another terminal:
2013-03-25 17:23:17,004 unit:unattended-upgrades/1:
A pal spotted this bug report and suggests [this] is caused by vsftp
switching pid namespaces (audit kernel code prohibits). Hope this
helps.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to vsftpd in Ubuntu.
Public bug reported:
First, apologies for the complicated configuration.
I use the 'uvt' front-end to libvirt-managed kvm guest machines. I also
have a LAN with a router that does local dynamic DNS configuration with
the client-provided dhcp hostnames.
I would like to resolve hostnames on my
*** This bug is a duplicate of bug 1126488 ***
https://bugs.launchpad.net/bugs/1126488
Robie, this very well might be an abuse of dnsmasq; however, the
upstream author discusses a libvirt-managed dnsmasq instance as a
perfectly well supported configuration in
Thomas, I'm experiencing this problem on Raring. The uvt version (in
the source code) is:
script_version=2013021401
I upgraded to Raring completely -- this isn't a frankenmonster :) --
after having successfully working 12.04 LTS and 12.10 configurations.
(Obviously, with earlier versions of uvt,
based on exec()
rather than popen().
- Enable PIE for the binaries.
Thanks
** Changed in: lxc (Ubuntu)
Assignee: Seth Arnold (seth-arnold) = MIR approval team (ubuntu-mir)
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc
Urgh. sorry for losing track of this bug. I forgot to subscribe after
submitting my comment.
I believe your proposed additional check would be sufficient. I _think_
better might be to destroy the lock pointer in the shared structure when
freeing the object but before unlocking -- preventing other
Blueprint changed by Seth Arnold:
Whiteboard set to:
sarnold would like to know roughly how many people have deployed his
charms and would like to know roughly how many have upgraded the charm
recently
--
Add User Feedback loops and Social Networking to Charm Store Charm Pages
https
*** This bug is a security vulnerability ***
Public security bug reported:
See mysql issues here:
http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html#AppendixMSQL
** Affects: mysql-5.1 (Ubuntu)
Importance: Undecided
Status: New
** Affects: mysql-5.5 (Ubuntu)
*** This bug is a security vulnerability ***
Public security bug reported:
ClamAV has released 0.97.8 to address several security issues:
http://blog.clamav.net/2013/04/clamav-0978-has-been-released.html
CVEs are not currently assigned.
** Affects: clamav (Ubuntu)
Importance: Undecided
** Description changed:
ClamAV has released 0.97.8 to address several security issues:
http://blog.clamav.net/2013/04/clamav-0978-has-been-released.html
- CVEs are not currently assigned.
+ CVE-2013-2020 and CVE-2013-2021.
** CVE added: http://www.cve.mitre.org/cgi-
I tested libvirt-bin on quantal: the current archive version does not
properly re-create /etc/dnsmasq.d/libvirt-bin symbolic link when
installed, uninstalled, and re-installed.
The -proposed version does properly re-create the /etc/dnsmasq.d
/libvirt-bin symbolic link.
(Ignore the
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Have you been able to reproduce this problem using the Ubuntu-provided
tftpd-hpa package?
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to tftp-hpa in Ubuntu.
https://bugs.launchpad.net/bugs/1188827
Title:
User option (-u or --user)
I see on http://www.clamav.net/lang/en/
daily.cvd ver. 17382 released on 19 Jun 2013 12:41 :0400 (sig count:
1359577)
Can you clarify what you mean?
Thanks
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of
Pieter, the private key is never made available in any form to the sshd
server. The server only has access to the public portion of the key in
~/.ssh/authorized_keys. You would probably not want a file on the
filesystem to serve as the secret key for your encrypted directory, as
that defeats the
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to bacula in Ubuntu.
https://bugs.launchpad.net/bugs/1197018
Title:
bacula-dir.conf does not use random password
To
Thanks Thomas,
You need to configure things such that each nameserver listed in resolv.conf
can resolve
all names you want resolved.
This requirement feels impossible to meet; the dnsmasq spawned by
libvirt on my laptop knows only the VMs running on my laptop. It is not
possible for this
** Changed in: bind9 (Ubuntu)
Status: New = Confirmed
** Changed in: bind9 (Ubuntu)
Importance: Undecided = Wishlist
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to bind9 in Ubuntu.
https://bugs.launchpad.net/bugs/1202278
Indeed, this looks useful.
However, performing the rate limiting in the kernel using firewall rules
can be more efficient and not require any BIND patches.
There are three mechanisms I can think of for performing this rate
limiting today, without waiting for updates:
- Insert iptables hashlimit
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
There are two config files, /etc/ssh/ssh_config and
/etc/ssh/sshd_config, that live in this directory. ssh_config does not
respect the AllowUsers configuration option (see ssh_config(5));
sshd_config _does_ respect the AllowUsers configuration option.
Please re-check which file you have modified.
*** This bug is a duplicate of bug 1070093 ***
https://bugs.launchpad.net/bugs/1070093
** This bug has been marked a duplicate of bug 1070093
package slapd (not installed) failed to install/upgrade: le sous-processus
script post-installation installé a retourné une erreur de sortie d'état
Tomcat7 in 12.04 LTS is community supported -- H.-Dirk, is your
backported package of sufficient quality that the debdiff could be used
to provide an update for other precise users? Please see
https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for some details.
Thanks
--
You received this
It might be possible to bring the feature to 12.04 LTS, through one of
two mechanisms:
The Stable Release Update process
https://wiki.ubuntu.com/StableReleaseUpdates is usually used to fix
high-impact bugs. I'd be prepared to ask the SRU team to include rate-
limiting DNS responses as such an
bind9 updates for CVE-2013-4854 were released on 2013-07-29 in
USN-1910-1. Please see http://www.ubuntu.com/usn/usn-1910-1/ for more
details.
Thanks.
** Changed in: bind9 (Ubuntu)
Status: New = Fix Released
** Information type changed from Private Security to Public Security
** CVE
)
Assignee: Seth Arnold (seth-arnold) = (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/509647
Title:
[MIR] lxc
To manage notifications about this bug go to:
https
.
Security team ACK for including in main.
Thanks
** Changed in: ruby-safe-yaml (Ubuntu)
Assignee: Seth Arnold (seth-arnold) = (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to ruby-safe-yaml in Ubuntu.
https
Stéphane, thanks for fixing this.
Security team ACK for main.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/509647
Title:
[MIR] lxc
To manage notifications about this bug go to:
Thanks for your comments. This does not appear to be a bug report and we
are closing it. We appreciate the difficulties you are facing, but it
would make more sense to raise your question in the support tracker.
Please visit https://answers.launchpad.net/ubuntu/+addquestion
** Changed in: openssh
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cyrus-sasl2 in Ubuntu.
https://bugs.launchpad.net/bugs/1187001
Title:
saslauthd[26791]: segfault at 0 ip b71de6f1 sp bfcd2d9c
I think this hasn't been addressed in part because it didn't get a CVE
number: http://openwall.com/lists/oss-security/2013/07/12/4
Since the service appears to be restarting without qualm, I can see why
it didn't get a CVE, but this does seem less than awesome.
Mancha made a lot of patches for
Are you confident about multi-threading? I don't see any linker commands
to link against the threading libraries in our build logs:
https://launchpadlibrarian.net/92810645/buildlog_ubuntu-precise-amd64
.cyrus-sasl2_2.1.25.dfsg1-3_BUILDING.txt.gz and I also see extensive
use of fork(2) in the
Mancha, thanks! I'm sorry I overlooked it. (Even worse, I did the triage
way back when I forgot about it in the meantime:
http://people.canonical.com/~ubuntu-security/cve/2013/CVE-2013-4122.html
)
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
We do not ship any virus definitions for clamav, all those are provided
by upstream clamav developers.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to clamav in Ubuntu.
https://bugs.launchpad.net/bugs/1237265
Title:
clamav
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
sense
on all platforms involved.
Security team ACK for promoting to main.
Thanks
** Changed in: open-vm-tools (Ubuntu)
Assignee: Seth Arnold (seth-arnold) = (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to open-vm
I'm marking this closed, Ubuntu 12.04 LTS and newer packages have lines
such as:
# always refresh Packages and Release files
refresh_pattern \/(Packages|Sources)(|\.bz2|\.gz)$ 0 0% 0
refresh_pattern \/Release(|\.gpg)$ 0 0% 0
refresh_pattern \/InRelease$ 0 0% 0
If this recurs, please re-open.
** Information type changed from Private Security to Public Security
** Changed in: samba (Ubuntu)
Status: New = Incomplete
** Changed in: samba (Ubuntu)
Status: Incomplete = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is
)
Assignee: Seth Arnold (seth-arnold) = (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in Ubuntu.
https://bugs.launchpad.net/bugs/1242726
Title:
[MIR] php5-common is missing dependency on php5-json
To manage notifications
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
I don't believe OpenVPN makes any effort to prevent communications
through other configured networks; it is designed to allow creating a
virtual private network, not provide a mechanism to tunnel all other
traffic off the system out of an untrusted network. I do not know if
there are any drop-in
*** This bug is a duplicate of bug 49579 ***
https://bugs.launchpad.net/bugs/49579
Thank you for taking the time to report this bug and helping to make
Ubuntu better. This particular bug has already been reported and is a
duplicate of bug 49579, so it is being marked as such.
This is a
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks,
I suspect you can fix your issue by deleting /etc/subgid.lock, dpkg
--purge openssh-server nfs-kernel-server, then re-install the openssh-
server and nfs-kernel-server.
Can you attach your related /var/log/syslog and /var/log/syslog.1 (or
other files)? I'm curious how the subgid.lock
This reminds me of https://bugs.launchpad.net/ubuntu/+source/gnome-
keyring/+bug/1271591 -- I'm not confident that it is a duplicate -- but
the symptoms feel very similar.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openssh
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
https://bugs.launchpad.net/bugs/1254034
Title:
txlongpoll.yaml contains password but is world
Public bug reported:
Binary package hint: lm-sensors
I cannot create an RRD database with my lm-sensors sensord:
Jun 8 00:34:27 haig sensord: Creating round robin database
Jun 8 00:34:27 haig sensord: Error creating RRD file: /var/log/sensord.rrd:
Duplicate DS name: temp1
This bug has been
Public bug reported:
Binary package hint: lm-sensors
I wrote some limits for my sensors into an /etc/sensors.d/ file, but I
need to reset the limits with sensors -s after resuming from sleep.
I'm not sure why the limit information is lost after suspending, but
working around it by running
** Patch added: /etc/pm/sleep.d/10_lm-sensors
http://launchpadlibrarian.net/50524075/10_lm-sensors
--
after resuming from suspend, sensors -s is required
https://bugs.launchpad.net/bugs/595789
You received this bug notification because you are a member of Ubuntu
Server Team, which is
Public bug reported:
Binary package hint: ntp
Small (harmless) typo in the ntpdate manpage.
ProblemType: Bug
Architecture: amd64
Date: Sat Jan 23 16:31:50 2010
DistroRelease: Ubuntu 9.10
InstallationMedia: Ubuntu 9.10 Karmic Koala - Release amd64 (20091027)
Package: ntpdate
Oh yeah, also in upstream Debian (which is where the svn repo came
from), if anyone can easily push there too, I'm sure they'd like it. :)
--
typo in ntpdate manpage (patch included)
https://bugs.launchpad.net/bugs/511743
You received this bug notification because you are a member of Ubuntu
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
*** This bug is a duplicate of bug 1281829 ***
https://bugs.launchpad.net/bugs/1281829
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Please note the following in your logs:
[ 1800.804033] mce: [Hardware Error]: Machine check events logged
MCE are hardware errors and cannot be fixed in software.
Probably your computer needs new motherboard, CPU, memory, or something
else similarly drastic. Thanks.
** Information type changed
After discussion between Adam Conrad, Thomas Ward, Dimitri John Ledkov,
and myself, we came to conclusion that we should not remove the nginx-
lua module from the distribution. So, we will re-promote lua5.1 to main
as a build dependency for nginx and continue building the nginx-lua
module so
Trusty uses the --with-debug on all binaries; Saucy does not. Saucy
should probably just get the upstream Nginx patch to enable that one
code block.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nginx in Ubuntu.
Patricia, it is currently blocked by (at least) the security team
review; this review is currently blocked by preparing a new apparmor
package upload for trusty. I sincerely hope this upload is completed
this week.
--
You received this bug notification because you are a member of Ubuntu
Server
chkrootkit is hilariously overzealous here; it is checking if /sbin/init
contains the string HOME, which upstart most definitely does:
$ grep HOME upstart/saucy/upstart-1.10/init/*
grep: upstart/saucy/upstart-1.10/init/man: Is a directory
grep: upstart/saucy/upstart-1.10/init/tests: Is a
Public bug reported:
When upgrading nginx, I found this:
Setting up nginx-common (1.4.1-3ubuntu1.3) ...
Setting up nginx-light (1.4.1-3ubuntu1.3) ...
* Starting nginx nginx
nginx: [emerg] bind() to
Thomas, I was upgrading from version 1.4.1-3ubuntu1.2.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nginx in Ubuntu.
https://bugs.launchpad.net/bugs/1295892
Title:
nginx upgrade failed
To manage notifications about this
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
I partially reviewed juju-core version 1.17.6-0ubuntu1 as checked into
trusty. This shouldn't be considered a full security audit; this review is
even more cursory than usual, since the MIR has been retracted for trusty.
So, here's the notes I've collected thus far in the hopes that they are
Hello, thanks for reporting this to Ubuntu; however, we do not have any
plans to update OpenSSL on released distributions. We will only provide
specific security updates as described at
https://wiki.ubuntu.com/SecurityTeam/FAQ#Versions
If you need TLS 1.2 support in the client programs, Ubuntu
Did you restart nginx or reboot your system after applying the update?
Thanks
** Information type changed from Private Security to Public Security
** Changed in: nginx (Ubuntu)
Status: New = Incomplete
--
You received this bug notification because you are a member of Ubuntu
Server
Kai, thanks, that makes more sense. Have fun!
** Changed in: nginx (Ubuntu)
Status: Incomplete = Invalid
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nginx in Ubuntu.
https://bugs.launchpad.net/bugs/1304304
Title:
nginx
There are several possible states of 'no password' -- the hashed
password field in /etc/shadow could be blank, could be a *, could be a
!, or could be a ! followed by a 'old password' that is currently
locked.
Do you have easy access to /etc/shadow lines that work as expected and
that don't work
I reviewed glusterfs version 3.4.2-1ubuntu1 as checked into trusty. This
should not be considered a full security audit, but rather a quick gauge
of maintainability.
I'm not going to fill in the full review checklist; I don't think that
the results would be that useful for anyone, so here's just
** Attachment added: cppcheck output
https://bugs.launchpad.net/ubuntu/+source/glusterfs/+bug/1274247/+attachment/4080255/+files/cppcheck.txt
** Changed in: glusterfs (Ubuntu)
Assignee: Seth Arnold (seth-arnold) = (unassigned)
--
You received this bug notification because you
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
I believe I just tripped this bug; I compressed some qcow2 images using
this:
for f in sec-{lucid,precise,quantal,saucy,trusty}-{amd64,i386} ;
do echo $f ;
qemu-img convert -s pristine -p -f qcow2 -O qcow2 $f.qcow2 reclaimed.qcow2 ;
mv reclaimed.qcow2 $f.qcow2 ;
virsh snapshot-delete $f
*** This bug is a duplicate of bug 1292234 ***
https://bugs.launchpad.net/bugs/1292234
Public bug reported:
After compacting qcow2 filesystem images some of them are no longer
bootable.
ProblemType: Bug
DistroRelease: Ubuntu 14.04
Package: qemu 2.0.0~rc1+dfsg-0ubuntu3.1
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
*** This bug is a duplicate of bug 1287222 ***
https://bugs.launchpad.net/bugs/1287222
** This bug has been marked a duplicate of bug 1287222
openssh-client 6.5 regression bug with certain servers
--
You received this bug notification because you are a member of Ubuntu
Server Team, which
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Public bug reported:
One of my VMs remounted its filesystem read-only; I discovered this in
the host's /var/log/libvirt/qemu/sec-trusty-amd64.log file:
2014-05-06 19:02:39.735+: shutting down
2014-05-07 18:44:45.578+: starting up
LC_ALL=C
Public bug reported:
The maas command line client is brittle to unexpected inputs. On trusty,
I tried to run the 'sudo maas createsuperuser' command that I used on
precise, quantal, and saucy, but it failed. I wanted detailed help, so I
ran 'maas -h', and that dumped a stack trace because the
Is there any reason you missed that that we can help to fix?
Only that in the middle of testing an update I followed the same
directions for precise, quantal, saucy, and noticed no problems until
trusty. Fair's fair, things change, but it would have been nice to have
a hint in the right
Looks good to me, but I moved the - LP: #1322338 annotation to after
the SECURITY UPDATE line in the format (LP: #1322338) instead. I'll
release this Monday.
Thanks Felix
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to mod-wsgi in
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Do you need the open-vm-tools package? It probably only works with the
original kernel shipped with 12.04 LTS in the 'linux' package rather
than the HWE (hardware enablement) kernel updates released later.
--
You received this bug notification because you are a member of Ubuntu
Server Team,
Public bug reported:
Please remove chkrootkit from main.
$ reverse-depends -c main src:chkrootkit
No reverse dependencies found
$ reverse-depends -b src:chkrootkit
No reverse dependencies found
$ seeded-in-ubuntu chkrootkit
chkrootkit (from chkrootkit) is seeded in:
ubuntu-server: daily
Thanks Colin; I hadn't heard of the Supported-Sysadmin-Common seed
before, and I asked James Page on IRC for feedback (for the server
seed). Are there better people to ask for feedback?
Thanks
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is
The impetus to remove chkrootkit is a (still embargoed) issue.
The output from such a tool can never be conclusive. No tool can report
this host is free of rootkits. When an administrator is suspicious the
better suggestion is to save the system image for further inspection and
re-install from
1 - 100 of 6676 matches
Mail list logo