[Bug 1741491] [NEW] Default logwatch configuration causes spurious "critical" states

2018-01-05 Thread Chris Fryer
Public bug reported: The file /etc/check_mk/logwatch.cfg contains the following stanza: /var/log/syslog /var/log/kern.log I registered panic notifier C panic C Oops W generic protection rip W .*Unrecovered read error - auto reallocate failed the "C panic" line sometimes fools Check_MK to

[Bug 1700754] Re: php-memcached is not fully working with PHP 7

2017-12-01 Thread Chris Fryer
Specifically this bug: https://bugs.php.net/bug.php?id=71187 "PHP 7.0 and up does not allow buggy return values from user save handler" Maybe a php7.0-memcached package using 3.0.4? https://pecl.php.net/package/memcached/3.0.4 ** Bug watch added: bugs.php.net/ #71187

[Bug 1289977] Re: Ubuntu 14.04 Update breaks grub, resulting in error: symbol 'grub_term_highlight_color' not found

2014-05-10 Thread Chris Fryer
@Phillip, Sorry for the slow reply. I borrowed another windows PC for my urgent problem. Here's the output: chris:~$ sudo efibootmgr BootCurrent: 0003 Timeout: 2 seconds BootOrder: 0003,0005,0004,0002,0001, Boot* Windows Boot Manager Boot0001* HDD0: Boot0002* HDD0: Boot0003* ubuntu

[Bug 1289977] Re: Ubuntu 14.04 Update breaks grub, resulting in error: symbol 'grub_term_highlight_color' not found

2014-05-07 Thread Chris Fryer
I have the same problem. Since upgrade from 13.10 to 14.04, I've run Boot Repair which failed. I do recall some issues getting grub working when I originally installed 13.04 but don't have a record of how I got it working. Upgrade from 13.04 to 13.10 went OK. I've spent the last five hours

[Bug 1263065] [NEW] php5-memcache segfaults with object (un)serialization

2013-12-20 Thread Chris Fryer
Public bug reported: I can reproduce https://bugs.php.net/bug.php?id=63142 in an up-to-date Ubuntu 12.04.3 LTS Package: php5-memcache Priority: optional Section: universe/web Installed-Size: 151 Maintainer: Ubuntu Developers ubuntu-devel-disc...@lists.ubuntu.com Original-Maintainer: Sergey B

[Bug 1263065] [NEW] php5-memcache segfaults with object (un)serialization

2013-12-20 Thread Chris Fryer
Public bug reported: I can reproduce https://bugs.php.net/bug.php?id=63142 in an up-to-date Ubuntu 12.04.3 LTS Package: php5-memcache Priority: optional Section: universe/web Installed-Size: 151 Maintainer: Ubuntu Developers ubuntu-devel-disc...@lists.ubuntu.com Original-Maintainer: Sergey B

[Bug 802565] [NEW] Arbitrary file limit in garbage-collection cron script causes loss of service

2011-06-27 Thread Chris Fryer
Public bug reported: PHP in Ubuntu 10.04.2 LTS includes /etc/cron.d/php5: 09,39 * * * * root [ -x /usr/lib/php5/maxlifetime ] [ -d /var/lib/php5 ] find /var/lib/php5/ -type f -cmin +$(/usr/lib/php5/maxlifetime) -print0 | xargs -n 200 -r -0 rm $ dpkg -S /etc/cron.d/php5 php5-common:

[Bug 802565] [NEW] Arbitrary file limit in garbage-collection cron script causes loss of service

2011-06-27 Thread Chris Fryer
Public bug reported: PHP in Ubuntu 10.04.2 LTS includes /etc/cron.d/php5: 09,39 * * * * root [ -x /usr/lib/php5/maxlifetime ] [ -d /var/lib/php5 ] find /var/lib/php5/ -type f -cmin +$(/usr/lib/php5/maxlifetime) -print0 | xargs -n 200 -r -0 rm $ dpkg -S /etc/cron.d/php5 php5-common:

[Bug 316441] Re: PHP session garbage collection

2011-06-24 Thread Chris Fryer
I had a similar issue to Phil. A web server was generating PHP sessions faster than they were being deleted by the cron job. This caused the disk on which /var/lib/php5 was located to run out of inodes, and thence to a loss of service. It is caused by this upstream workaround, which is poor:

[Bug 316441] Re: PHP session garbage collection

2011-06-24 Thread Chris Fryer
I had a similar issue to Phil. A web server was generating PHP sessions faster than they were being deleted by the cron job. This caused the disk on which /var/lib/php5 was located to run out of inodes, and thence to a loss of service. It is caused by this upstream workaround, which is poor:

[Bug 282674] Re: max_execution_time and max_input_time settings in php.ini are ignored by php cli

2008-10-14 Thread Chris Fryer
Thanks. Then I'll ask PHP to update their documentation. You link to a page that states: When running PHP from the command line the default setting is 0. It is not sufficiently clear that this value cannot be overridden in php.ini. However, it does say so here:

[Bug 282674] Re: max_execution_time and max_input_time settings in php.ini are ignored by php cli

2008-10-14 Thread Chris Fryer
Thanks. Then I'll ask PHP to update their documentation. You link to a page that states: When running PHP from the command line the default setting is 0. It is not sufficiently clear that this value cannot be overridden in php.ini. However, it does say so here:

[Bug 282674] [NEW] max_execution_time and max_input_time settings in php.ini are ignored by php cli

2008-10-13 Thread Chris Fryer
Public bug reported: Binary package hint: php5 Using PHP 5.2.3-1ubuntu6.4 (cli) (built: Jul 23 2008 06:20:35) on Ubuntu 7.10 Steps to reproduce: Edit /etc/php5/cli/php.ini Change max_execution_time to a non-zero value, e.g. 10 Change max_input_time to a non-zero value, e.g. 10 php -i | grep

[Bug 282674] [NEW] max_execution_time and max_input_time settings in php.ini are ignored by php cli

2008-10-13 Thread Chris Fryer
Public bug reported: Binary package hint: php5 Using PHP 5.2.3-1ubuntu6.4 (cli) (built: Jul 23 2008 06:20:35) on Ubuntu 7.10 Steps to reproduce: Edit /etc/php5/cli/php.ini Change max_execution_time to a non-zero value, e.g. 10 Change max_input_time to a non-zero value, e.g. 10 php -i | grep

[Bug 121374] Re: Denial of service through log injection in fail2ban

2007-12-12 Thread Chris Fryer
This is the relevant line from /etc/fail2ban.conf when fail2ban 0.6.0-3 is installed on Ubuntu 6.06 LTS (Dapper). failregex = : (?:(?:Authentication failure|Failed [-/\w+]+) for(?: [iI](?:llegal|nvalid) user)?|[Ii](?:llegal|nvalid) user) .* from (?:::f{4,6}:)?(?Phost\S*) This seems to allow any

[Bug 121374] Re: Denial of service through log injection in fail2ban

2007-06-21 Thread Chris Fryer
** Description changed: Binary package hint: fail2ban According to CVE 2006-6302 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-6302) fail2ban 0.6.1 and below is vulnerable to log injection techniques, which can lead to the wrong IP address being banned. This can result in denial of

[Bug 121374] Re: Denial of service through log injection in fail2ban

2007-06-21 Thread Chris Fryer
** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2006-6302 -- Denial of service through log injection in fail2ban https://bugs.launchpad.net/bugs/121374 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. --