Is there a workaround for this bug such as a way to delete from shell?
I'm not familiar enough with the internals of MAAS to do this safely.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
Raphael,
That works very well, thanks.
To start the shell, run
$ sudo maas shell
then proceed normally with those instructions.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
https://bugs.launchpad.net/bugs/994781
I am getting the same exception while trying to access my API endpoint
for use with ElasticFox. I followed the instructions on the wiki for
the CDInstall under 10.04 and euca-describe-availability-zones verbose
shows good output.
Please let me know if you would like any information from my
This bug is still present in Hardy final version. I am willing to debug
if someone can give me steps.
--
Desktop effects could not be enabled. Hardy Heron Alpha 4
https://bugs.launchpad.net/bugs/193702
You received this bug notification because you are a member of Ubuntu
Bugs, which is
I am also having this problem. Clean installation of Hardy shows no
shares available on a Windows file server. Used to work fine with this
particular file server under Gutsy.
--
SMB error: Unable to mount location
https://bugs.launchpad.net/bugs/209520
You received this bug notification
Public bug reported:
When installing Ubuntu Server i386 via CD-ROM, my RAID 2+0 array is not
detected as 1 drive, but as two separate drives. These are 2 IDE drives
attached. This also results in GRUB failing to boot after the installer
is complete.
My RAID controller is a Promise FastTrak133
** Description changed:
When installing Ubuntu Server i386 via CD-ROM, my RAID 2+0 array is not
detected as 1 drive, but as two separate drives. These are 2 IDE drives
attached. This also results in GRUB failing to boot after the installer
is complete.
- My RAID controller is a
https://bugs.launchpad.net/bugs/183685
Log in and click on unsubscribe in the right column.
On Fri, Oct 3, 2008 at 11:31 AM, Robin [EMAIL PROTECTED] wrote:
seriously some admin please remove me from this mailing list
CAREFACE
--
compiz.real crashed with SIGSEGV
I can confirm the problem in Jaunty with 8.63.2 and it also affects
JPEGs in the system as well as videos playing in totem (not just
Firefox).
--
Firefox 3.5 and up renders certain graphics with wrong colors (for
gfx.color_management.mode = 2) (8.632)
https://bugs.launchpad.net/bugs/386132
You
Crashes on login every time I start up.
--
gnome-keyring-daemon crashed with signal 5 in g_thread_join()
https://bugs.launchpad.net/bugs/405667
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
8.64.3 has resolved the problem for me as well running ATI HD3300.
--
Firefox 3.5 and up renders certain graphics with wrong colors (for
gfx.color_management.mode = 2) (8.632)
https://bugs.launchpad.net/bugs/386132
You received this bug notification because you are a member of Ubuntu
Bugs,
Any word on a decision to backport this fix to Lucid? I agree it is not
a terrible bug and more of a lack of a feature, but Lucid will be in use
for some time to come.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
This issue is still affecting me as well. I have installed all updates
from jaunty-proposed. Since this isn't technically a crash, I'm not
sure how to get the proper data to debug.
--
The Evolution calendars have quit unexpectedly
https://bugs.launchpad.net/bugs/361632
You received this bug
*** This bug is a duplicate of bug 363059 ***
https://bugs.launchpad.net/bugs/363059
** This bug has been marked a duplicate of bug 363059
[jaunty] dpms does not switch off backlight on laptop screen
--
fglrx doesn't turn off displays with dpms
https://bugs.launchpad.net/bugs/366034
You
Also affects Radeon HD 3300 video card on 64bit Jaunty. This is
definitely shaping up to be an fglrx bug.
--
[jaunty] dpms does not switch off backlight on laptop screen
https://bugs.launchpad.net/bugs/363059
You received this bug notification because you are a member of Ubuntu
Bugs, which is
I am getting the same exception while trying to access my API endpoint
for use with ElasticFox. I followed the instructions on the wiki for
the CDInstall under 10.04 and euca-describe-availability-zones verbose
shows good output.
Please let me know if you would like any information from my
Public bug reported:
Accidentally clicked cancel in debconf while trying to sort out changes
to menu.lst.
ProblemType: Package
Architecture: amd64
DistroRelease: Ubuntu 9.04
ErrorMessage: subprocess post-installation script returned error exit status 1
HibernationDevice:
** Attachment added: BootDmesg.txt
http://launchpadlibrarian.net/30048624/BootDmesg.txt
** Attachment added: CurrentDmesg.txt
http://launchpadlibrarian.net/30048625/CurrentDmesg.txt
** Attachment added: Dependencies.txt
http://launchpadlibrarian.net/30048626/Dependencies.txt
**
Public bug reported:
Binary package hint: ubuntuone-client
Applet crashes when right clicking.
ProblemType: Bug
.home.brian..cache.ubuntuone.log.syncdaemon.exceptions.log:
.home.brian..config.ubuntuone.ubuntuone.client.conf:
[ubuntuone]
bookmarked = False
connected = True
connect = 0
** Attachment added: .home.brian..cache.ubuntuone.log.oauth.login.log.txt
http://launchpadlibrarian.net/40126494/.home.brian..cache.ubuntuone.log.oauth.login.log.txt
** Attachment added: Dependencies.txt
http://launchpadlibrarian.net/40126495/Dependencies.txt
** Attachment added:
The syncdaemon debug log is attached. There were no syncdaemon
exceptions when the applet crashed. This is reproduced by clicking
connect on the applet and then after about a minute or two of no
activity, clicking again on the applet.
** Attachment added: syncdaemon.log
I was running into this issue on Karmic and now I have tried Lucid Beta
1. The behavior here is a little different because the shares do mount
on startup, but error messages are still displayed in the terminal.
mount.nfs: DNS resolution failed for hostname: Name or service not known
mountall:
Thanks for the helpful info. I'll make sure to report back after that
package is updated.
--
retry remote devices when parent is ready after SIGUSR1
https://bugs.launchpad.net/bugs/470776
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Attachment added: oauth-login.log
http://launchpadlibrarian.net/40938447/oauth-login.log
--
ubuntu one client crashes on context menu click
https://bugs.launchpad.net/bugs/531709
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
Is there a workaround for this bug such as a way to delete from shell?
I'm not familiar enough with the internals of MAAS to do this safely.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/994781
I think LVM2 is related here as Stefan suggests. I have a 2 disk RAID1
with LVM, 1 PV (the RAID 1), 1 VG, 2 LVs (one for root, one for swap).
I experience the same problem as Bernd.
I'm going to attempt the same setup without LVM and see if it works
properly.
--
You received this bug
Rebuilt my server with no LVM, just 2 drive RAID1 for root and another
for swap with ext4 FS. Failed each disk individually and rebooted with
no problems, then resynced. I think LVM certainly plays a role in this
bug.
--
You received this bug notification because you are a member of Ubuntu
Public bug reported:
USB boot of 13.04 AMD64 desktop edition on an Asus K55N laptop with UEFI
enabled (system came preinstalled with Windows 8). Upon selecting
either try or install, I am greeted with Binary is whitelisted on
a black screen. The installer will not proceed further.
I have
I'm taking a guess that it is grub2 related, may not be the case.
** Package changed: ubuntu = grub2 (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1178047
Title:
Binary is whitelisted at
I can confirm that installing portmap fixes the shutdown issue on
10.04.4. The mkdir workaround in the init script does not work
correctly any longer. This should be addressed in SRU as it is a
serious loss of stability when working with remote servers.
--
You received this bug notification
Raphael,
That works very well, thanks.
To start the shell, run
$ sudo maas shell
then proceed normally with those instructions.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/994781
Title:
Public bug reported:
checkinstall 1.6.2-3ubuntu1 has a command like this to create conffiles:
find -L $BUILD_DIR/etc -type f 2 /dev/null | sed -e s,$BUILD_DIR,, | \
$BUILD_DIR/DEBIAN/conffiles
It is attempting to pipe and redirect the output, resulting in an empty
conffiles. Removing
I did not file a new bug only because it was a system that I was sending
off for production use and I stuck with the non-LVM RAID for
reliability. I could attempt reproduction on another system, but I'm
pretty sure it will happen on any system with the steps I described.
Note that I didn't
This worked for me:
ssh -v admin@172.16.3.253 -o KexAlgorithms=diffie-hellman-group14-sha1
source:
http://stackoverflow.com/questions/25341773/cisco-ssh-key-exchange-
fails-from-ubuntu-14-04-client-dh-key-range-mismatch
--
You received this bug notification because you are a member of Ubuntu
This worked for me:
ssh -v admin@172.16.3.253 -o KexAlgorithms=diffie-hellman-group14-sha1
source:
http://stackoverflow.com/questions/25341773/cisco-ssh-key-exchange-
fails-from-ubuntu-14-04-client-dh-key-range-mismatch
--
You received this bug notification because you are a member of Ubuntu
Bug is fixed in Wily due to a resync with upstream.
http://changelogs.ubuntu.com/changelogs/pool/universe/z/zsnes/zsnes_1.510+bz2-8/changelog
Also, they added a debug package, which is great news.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
IMHO, this was a horribly bad decision upstream. If you've restricted
your incoming NRPE source to a trusted one with UFW or similar, this is
a perfectly safe thing to do and helps centrally manage lots of
parameters. I think a default arg of 0 was enough to keep a safe
config. Users who choose
IMHO, this was a horribly bad decision upstream. If you've restricted
your incoming NRPE source to a trusted one with UFW or similar, this is
a perfectly safe thing to do and helps centrally manage lots of
parameters. I think a default arg of 0 was enough to keep a safe
config. Users who choose
I suspect there isn't a code change here, but rather a difference in the
way Ubuntu is presenting its mount points. The plugin tries to
enumerate and check all mounts. A better use might be to add the actual
mount points to be monitored with -p
/usr/lib/nagios/plugins/check_disk -w '20%' -c
strace confirms that check_disk on 12.04 doesn't check
/sys/kernel/debug/tracing
Not having any luck tracking down a code change in the monitoring-
plugins github repo. I wonder if this is a change in a dependent lib
instead.
Here's a workaround
sudo chown root:root
strace confirms that check_disk on 12.04 doesn't check
/sys/kernel/debug/tracing
Not having any luck tracking down a code change in the monitoring-
plugins github repo. I wonder if this is a change in a dependent lib
instead.
Here's a workaround
sudo chown root:root
I suspect there isn't a code change here, but rather a difference in the
way Ubuntu is presenting its mount points. The plugin tries to
enumerate and check all mounts. A better use might be to add the actual
mount points to be monitored with -p
/usr/lib/nagios/plugins/check_disk -w '20%' -c
No problem, just let me know if they need different versioning because
of the potential conflict. I plan to produce one for trusty shortly. At
this point, is the team encouraging CVE fixes for precise? This is not
easy to exploit, so it might not be worth the review/publishing time.
--
You
Seth, sorry about that. I think I was moving a little too quickly on
that one. Corrected one attached.
** Patch removed: "Debdiff for trusty"
https://bugs.launchpad.net/ubuntu/+source/libssh2/+bug/1664812/+attachment/4820419/+files/libssh2_1.4.3-2ubuntu0.1.debdiff
** Patch added: "Debdiff
** Changed in: proftpd-dfsg (Ubuntu)
Assignee: (unassigned) => Brian Morton (rokclimb15)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1246245
Title:
proftpd service fails to rest
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1664812
Title:
CVE-2016-0787
To manage notifications about this bug go to:
;bits/bytes
confusion bug."
** Affects: libssh2 (Ubuntu)
Importance: Undecided
Assignee: Brian Morton (rokclimb15)
Status: New
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0787
** Changed in: libssh2 (Ubuntu)
Assignee: (unassigned) =>
Debdiff for Yakkety
The vuln has no specific known attack methods so there is no public
exploit available. Package tests have passed and I used a somewhat
unusual method to explicitly regression test. Package php-ssh2 depends
on libssh2.
'diffie-hellman-group1-sha1'
);
// Make our connection
** Changed in: libssh2 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1664812
Title:
CVE-2016-0787
To manage notifications about this bug go to:
Tweaked this debdiff changelog for Zesty upload. Same package version as
Yakkety.
** Patch added: "Debdiff for zesty"
https://bugs.launchpad.net/ubuntu/+source/libssh2/+bug/1664812/+attachment/4819154/+files/libssh2_1.7.0-1ubuntu0.1.zesty.debdiff
--
You received this bug notification
Debdiff for xenial
** Patch added: "Debdiff for xenial"
https://bugs.launchpad.net/ubuntu/+source/libssh2/+bug/1664812/+attachment/4819155/+files/libssh2_1.5.0-2ubuntu0.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Attaching debdiff for trusty. Editing bug to add SRU justification.
** Patch added: "Debdiff for trusty"
https://bugs.launchpad.net/ubuntu/+source/proftpd-dfsg/+bug/1246245/+attachment/4817938/+files/proftpd-dfsg_1.3.5~rc3-2.1ubuntu3.debdiff
** Description changed:
+ [Impact]
+
+ *
Debdiff for trusty
** Patch added: "Debdiff for trusty"
https://bugs.launchpad.net/ubuntu/+source/libssh2/+bug/1664812/+attachment/4820419/+files/libssh2_1.4.3-2ubuntu0.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Patch added: "Debdiff for precise"
https://bugs.launchpad.net/ubuntu/+source/libssh2/+bug/1664812/+attachment/4820426/+files/libssh2_1.2.8-2ubuntu0.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Revised debdiff with correct changelog message.
** Patch added: "Debdiff for trusty with corrected changelog"
https://bugs.launchpad.net/ubuntu/+source/proftpd-dfsg/+bug/1246245/+attachment/4818195/+files/proftpd-dfsg_1.3.5~rc3-2.1ubuntu3.debdiff
** Patch removed: "Debdiff for trusty"
Public bug reported:
When using a long ProxyPass worker name such as unix:///var/php-
fpm/146527084714328.sock|fcgi://localhost/home/mysite/domains/subdomain.com/public_html/$1
Apache issues the fatal error AH00526 and refuses to proceed during
reload. This is a typical configuration generated by
Patch attached for trusty. Unsure how to generate a debdiff in this
case.
** Patch added: "Patch for trusty"
https://bugs.launchpad.net/apache2/+bug/1668474/+attachment/4827987/+files/mod-proxy-worker-name-size.patch
--
You received this bug notification because you are a member of Ubuntu
As a workaround for trusty, you can use unix:///run/php-fpm/php-
fpm.sock|fcgi://127.0.0.1:9000/srv/http/ (notice the triple slash on the
unix socket). Only problem then is the length of the variable
https://bz.apache.org/bugzilla/show_bug.cgi?id=53218
** Bug watch added: bz.apache.org/bugzilla/
** Changed in: apache2 (Ubuntu)
Assignee: (unassigned) => Brian Morton (rokclimb15)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1668474
Title:
AH00526 when using long ProxyPass worker n
bmorton@maui:~$ sudo apt-get install proftpd-basic/trusty-proposed
Reading package lists... Done
Building dependency tree
Reading state information... Done
Selected version '1.3.5~rc3-2.1ubuntu2.2' (Ubuntu:14.04/trusty-proposed
[amd64]) for 'proftpd-basic'
Suggested packages:
openbsd-inetd
Public bug reported:
On 16.04.1, use lxd init with default responses (zfs, loopback, 10G).
Create container with lxc launch. Attempt to resize container root to
20G (larger than loopback file).
lxc set device root size 20G reports no error, but the container still
has a 1.1G root as shown by lxc
Makes sense to me, thanks for looking into that!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1636617
Title:
lxc set device root size fails silently when out of space
To manage notifications
** Changed in: python2.7 (Ubuntu)
Assignee: (unassigned) => Brian Morton (rokclimb15)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1512068
Title:
Python ctypes.util , Shell Inject
Attached is a debdiff for trusty. If someone could please review and
provide feedback, I'll produce additional ones for precise, xenial,
yakkety, and zesty
** Patch added: "Debdiff of modified upstream patch for trusty"
Nominating this for wontfix since security support has ended for
releases with haproxy >= 1.5 and <= 1.5.7. Everything earlier doesn't
have SSL support built-in, and everything later is unsupported or has
received the upstream fix. The solution is to upgrade to trusty and use
backports or upgrade
After further research, the regression has been reported to Debian and a
patch is attached to that report. It does not appear to have been
applied. Debdiff attached for precise.
** Patch added: "Debdiff for precise"
://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781169
** Also affects: checkinstall (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781169
Importance: Unknown
Status: Unknown
** Changed in: checkinstall (Ubuntu)
Assignee: (unassigned) => Brian Morton (rokclimb15)
--
Debdiff for Trusty and all newer releases.
** Patch added: "Debdiff for trusty and newer"
https://bugs.launchpad.net/debian/+source/checkinstall/+bug/1304760/+attachment/4791416/+files/checkinstall_1.6.2-4ubuntu2.debdiff
--
You received this bug notification because you are a member of
This is interesting since the bug was fixed in 1.6-dev2.
https://github.com/haproxy/haproxy/commit/4cd477f3721f6a3fe7cf55ae729388bf7f279331
There are two curious conditions in the code:
if (s->admin & SRV_ADMF_MAINT)
return;
if (s->state == SRV_ST_STARTING || s->state == SRV_ST_RUNNING)
Hi Ian, can you raise ulimit, add CoreDumpDirectory, and install
apache2-dbg (will restart to make prior two changes effective)? If you
make CoreDumpDirectory /tmp, make sure to move your core dump out of the
way before you reboot.
https://httpd.apache.org/dev/debugging.html#crashes
Then you'll
0.7.5 was removed from yakkety-proposed, but the FTBFS continues in
Zesty. Here's a backtrace and disassembly on i386. If anyone has ideas,
I'd appreciate them.
** Tags added: zesty
** Attachment added: "gdb bt of core dump"
I don't see evidence of this error in the amd64 build log at
https://launchpadlibrarian.net/298782129/buildlog_ubuntu-zesty-amd64
.location-service_3.0.0+16.10.20160912-0ubuntu2_BUILDING.txt.gz.
However, the package does FTBFS due to this bug
Ref https://bugs.launchpad.net/ubuntu/+source/python3.5/+bug/1650202 and
https://github.com/python/typing/commit/7baf6fe2a6d96ab09c807aac174650baa35d15dd
Optional returns a Union, which can't be subclassed.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
Could you please post your libvirt config file for the domain?
Specifically, I'd like to know if it has the apic feature enabled.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1637835
Title:
Zesty
This is expected behavior from upstream changes.
https://github.com/python/typing/commit/7baf6fe2a6d96ab09c807aac174650baa35d15dd
Optional is shorthand for Union, and Union cannot be subclassed. This
behavior "worked" before, but was undefined and returned unpredictable
results.
** Changed in:
Attaching debdiff of upstream patch for trusty package. Precise is also
vulnerable, so I will mark that as well while I work on that next.
My primary test before/after patch:
220 ProFTPD 1.3.5rc3 Server (Debian) [:::10.129.53.2]
USER bmorton
331 Password required for bmorton
PASS ***
230
Attaching debdiff of upstream patch for precise. Tested in same manner
as trusty.
** Patch added: "Debdiff of upstream patch for precise"
https://bugs.launchpad.net/ubuntu/+source/proftpd-dfsg/+bug/1462311/+attachment/4787127/+files/proftpd-dfsg_1.3.4a-2.debdiff
--
You received this bug
Adding reworked patch for precise that fixes an API issue with returning
the error code/message and is more minimal and appropriate for a
backported fix.
** Patch added: "Debdiff of upstream patch for precise"
Adding reworked patch for trusty that fixes an API issue with returning
the error code/message and is more minimal and appropriate for a
backported fix.
** Patch removed: "Debdiff of upstream patch for precise"
Hi Brian,
Thanks for taking the time on this really old bug. Will this work?
root@checkinstall-bug-trusty:~# apt-get source haproxy checkinstall
root@checkinstall-bug-trusty:~# cd haproxy*
root@checkinstall-bug-trusty:~/haproxy-1.5.14# mkdir -p etc/haproxy
root@checkinstall-bug-trusty:~# apt-get install checkinstall
root@checkinstall-bug-trusty:~# apt-get source haproxy
root@checkinstall-bug-trusty:~# cd haproxy*
root@checkinstall-bug-trusty:~/haproxy-1.5.14# mkdir -p etc/haproxy
root@checkinstall-bug-trusty:~/haproxy-1.5.14# touch
Bug has been fixed upstream http://bugtrack.izto.org/show_bug.cgi?id=35
** Bug watch added: izto #35
http://bugtrack.izto.org/show_bug.cgi?id=35
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Zesty 0.8.0-1 is the current FTBFS. I was able to progress the debugging
a bit and something is scribbling on the stack. The problem I'm
experiencing is gdb disables breakpoints in the shared lib I need to
examine the stack canary address.
Starting program: /usr/sbin/apache2 -X -f
According to the Debian maintainer this does not occur in unstable on
i386. Both apache2 and libgnutls30 are newer in unstable, so that could
be related.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Correction, it still segfaults on test 24 after the string format issues
are fixed.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1597450
Title:
mod-gnutls FTBFS: test failure: apache2 seg fault
Using latest deps in proposed Apache no longer segfaults on i386. FTBFS
persists due to -Werror=format in the build and a few format/type issues
that are easily fixed. Beyond that, test 24 still fails now with an
error about the PKCS11 URL format which needs further investigation.
0.8.1 fixes the
Tried building openssl 1.1 to match Debian sid, as well as latest
apache2 and gnutls. All still segfault on i386 during this test. Out of
ideas at this point.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Hi Thomas,
Good info, thanks. It's definitely a possibility, but I'm having a hard
time explaining how that package could be responsible when it is synced
with Sid as well and the configure strings in the build logs appear to be
the same. I also tried a build from upstream source with the same
An excellent question/point. That should probably get hashed out on the
upstream BZ first. The discussion about it was very minimal. I'll get on
there and poke at that issue.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
I don't think it is an actual incompatibility since the util function
for copying those values takes into consideration the size of the dst
buffer. As long as it is being lengthened, I think it's OK. It would be
a problem if we were reducing it and src were larger than dst.
#define
Hi Robie,
I do not know for certain. One user on the upstream bug mentions it
can't be backported because of an API compat issue, but if there's one
present I'm sure not seeing it. The define is entirely contained within
that header file. The only thing I would think it could affect would be
Had the same error, but commenting/adjusting LimitNPROC didn't fix the
issue. Ultimately I had to make the container unconfined by AA and
privileged to get openvpn to start.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Hi Robie, this fix is in Apache SVN trunk but isn't in upstream stable
2.4 release branch yet so all Ubuntu versions will be affected. In
addition, no such patch exists in Debian source.
https://anonscm.debian.org/cgit/pkg-
apache/apache2.git/tree/modules/proxy/mod_proxy.h#n350 and
** Also affects: apache2 (Debian)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1668474
Title:
AH00526 when using long ProxyPass worker name
To manage
Thanks for the core dump and bt Christophe. After a bit of research, I
believe this is a race condition present in 2.4.7 which was subsequently
patched, and then the patch refactored when the suspend/resume hooks
were added in 2.4.10. The fix in 2.4.7 seems simply enough (just move
c->sbh = NULL
Adam,
Thanks for the idea, that's helpful and makes sense. I checked the debian
build logs for libapache2-mod-gnutls, p11-kit, softhsm2, and glibc. They're
all built with stack-protector-strong.
On Tue, May 30, 2017 at 3:39 PM, Adam Conrad wrote:
> The difference between
Tests are here:
https://github.com/latchset/jwcrypto/pull/66/commits/b2b66b53bc0df72eb761959fe39700451803d8ab
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1717356
Title:
CVE-2016-6298
To manage
Hi Christophe,
Thanks for your hard work on this one. Unfortunately I can't reproduce
the crash with your test. I even raised the file size to 500M, but still
nothing.
Is there anything I could be missing? Any PPA packages with newer
versions of PHP or other Apache modules loaded?
Message Attack (MMA).
https://people.canonical.com/~ubuntu-
security/cve/2016/CVE-2016-6298.html
** Affects: python-jwcrypto (Ubuntu)
Importance: Undecided
Assignee: Brian Morton (rokclimb15)
Status: In Progress
** Information type changed from Private Security to Public
17.04 and 17.10 are not affected since they publish the fixed version
0.3.2. 16.04 appears to be affected, but the code is significantly
different. I've requested info from the source project owner to test my
proposed patch for 16.04.
--
You received this bug notification because you are a
1 - 100 of 132 matches
Mail list logo