I'm attaching the trio of commits to fix the bug in a single patch,
rebased on top of the upstream 1.3.0 release. Hopefully somebody can
use this as the basis of a patch against the package itself.
Locally it seems to resolve parsing of the ssl.conf file at
With regards to manual regression testing for a stable update, I'd
suggest running "augtool print /files/etc/apache2" (with Apache, mod_ssl
and optionally, other Apache modules installed) to check if any files
that used to parse now fail in any way. Hopefully the number of errors
will be reduced.
Public bug reported:
The fix for CVE-2013-4969 (tempfile vulnerability) contained a
regression affecting the default file mode if none is specified on a
file resource. This has been fixed in upstream 3.4.2 and 2.7.25.
Upstream bug: https://tickets.puppetlabs.com/browse/PUP-1255
Please apply
bits of the
modprobe lens, so my name change broke it. Attached is a followup patch
committed as c0ff479 which repairs the damage caused.
--
Dominic Cleal
domi...@computerkb.co.uk
** Patch added: 1054306-modprobe-wrap-c0ff479.patch
https://bugs.launchpad.net/bugs/1054306/+attachment/3339679
Could you share the contents of /etc/modprobe.d/iwlwifi.conf ?
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to netcf in Ubuntu.
https://bugs.launchpad.net/bugs/1054306
Title:
ncftool list fails
To manage notifications about this
attached if you want
to apply it.
http://git.fedorahosted.org/cgit/augeas.git/commit/?id=e599fed9
Regards,
--
Dominic Cleal
domi...@computerkb.co.uk
** Patch added: 1054306-modprobe-wrap.patch
https://bugs.launchpad.net/bugs/1054306/+attachment/3329888/+files/1054306-modprobe-wrap.patch