[Bug 259479] Re: php5 crashed with SIGSEGV in _Unwind_ForcedUnwind()
maybe bug in libmysqlclient15off http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=515143 ** Bug watch added: Debian Bug tracker #515143 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=515143 -- php5 crashed with SIGSEGV in _Unwind_ForcedUnwind() https://bugs.launchpad.net/bugs/259479 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 407428] Re: sshd zombie processes and strange behavior after karmic upgrade
I don't know if those are the same type of Signals, but maybe this bug I found is related: https://bugs.launchpad.net/ubuntu/+bug/412972 Could the ones of you that are also affected by the zombie processes try the kill example? -- sshd zombie processes and strange behavior after karmic upgrade https://bugs.launchpad.net/bugs/407428 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openssh in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 407324] Re: /etc/init.d/freeradius stop don't work
** Changed in: freeradius (Ubuntu Hardy) Assignee: (unassigned) = Chuck Short (zulcss) -- /etc/init.d/freeradius stop don't work https://bugs.launchpad.net/bugs/407324 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to freeradius in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 407297] Re: PANIC: internal error (usershare related)
Did you experience the same issue with older releases ? ** Changed in: samba (Ubuntu) Importance: Undecided = Medium ** Changed in: samba (Ubuntu) Status: New = Incomplete -- PANIC: internal error (usershare related) https://bugs.launchpad.net/bugs/407297 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to samba in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 409965] Re: Missing dependency
likewise-open inserts pam_lwidentity.so in the PAM stack, not pam_winbind.so. Just tested in karmic and it works ok on a fresh installation. Something else must have added pam_winbind.so to the stack. ** Changed in: likewise-open (Ubuntu) Status: New = Invalid -- Missing dependency https://bugs.launchpad.net/bugs/409965 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to likewise-open in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 407297] Re: PANIC: internal error (usershare related)
I dud not use this feature in any older releases. -- PANIC: internal error (usershare related) https://bugs.launchpad.net/bugs/407297 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to samba in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 392521] Re: Segmentation fault when running any script
Just to comment that this happens to me too. We have a bzr plugin which adds a pre-commit hook which runs all new and modified PHP files in the commit though php -l, as a basic sanity checker. From time to time php -l will segfault on a perfectly valid PHP file. Re-attempting usually succeeds. It gets most annoying when trying to do a large commit, since the greater number of files increases the chance of the segfault occurring, and can result in an irritating number of attempts being required in order for the commit to succeed. I've encountered the problem on a single-processor i386 machine running jaunty, and just now encountered it on an amd64 dual core machine running an up to date karmic system. The test case in the original bug report does reproduce the problem for me, but not every time. For each set of 50, I usually get 0-2 instances of the segfault happening. -- Segmentation fault when running any script https://bugs.launchpad.net/bugs/392521 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 305264] Re: gnutls regression: failure in certificate chain validation
Hardy openldap2.3 was fixed awhile ago, but didn't auto-close: openldap2.3 (2.4.9-0ubuntu0.8.04.3) hardy-proposed; urgency=low * debian/patches/gnutls-enable-v1-ca-certs: Enable V1 CA certs to be trusted (LP: #305264). -- Mathias Gug math...@ubuntu.com (mathiaz: 10900) [universe- contributors] [ubuntumembers] [ubuntu-dev] [ubuntu-bugcontrol] [ubuntu-core-dev]Wed, 25 Mar 2009 14:30:35 -0400 ** Changed in: openldap (Ubuntu Hardy) Status: Fix Committed = Fix Released -- gnutls regression: failure in certificate chain validation https://bugs.launchpad.net/bugs/305264 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openldap in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 413201] [NEW] [Sync Request] libmixlib-config-ruby
Public bug reported: Source Package: libmixlib-config-ruby Source Package Version: 1.0.9-1 Sync From: Debian sid main No Ubuntu-specific changes required ** Affects: ubuntu Importance: Undecided Status: New ** Description changed: - Binary package hint: nut - Source Package: libmixlib-config-ruby Source Package Version: 1.0.9-1 Sync From: Debian sid main No Ubuntu-specific changes required ** Package changed: nut (Ubuntu) = ubuntu -- [Sync Request] libmixlib-config-ruby https://bugs.launchpad.net/bugs/413201 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nut in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 305264] Re: gnutls regression: failure in certificate chain validation
Copied gnutls12 1.2.9-2ubuntu1.5 to dapper-security and dapper-updates ** Changed in: gnutls12 (Ubuntu Dapper) Status: Fix Committed = Fix Released ** Tags added: verification-done ** Tags removed: verification-needed -- gnutls regression: failure in certificate chain validation https://bugs.launchpad.net/bugs/305264 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openldap in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 305264] Re: gnutls regression: failure in certificate chain validation
This bug was fixed in the package gnutls26 - 2.4.1-1ubuntu0.3 --- gnutls26 (2.4.1-1ubuntu0.3) intrepid-security; urgency=low * Fix for certificate chain regressions introduced by fixes for CVE-2008-4989 * debian/patches/20_CVE-2008-4989.diff: updated to upstream's final 2.4.2 - 2.4.3 patchset for lib/x509/verify.c to fix CVE-2008-4989 and address all known regressions. To summarize from upstream: - Fix X.509 certificate chain validation error (CVE-2008-4989) - Fix chain verification for chains that end with RSA-MD2 CAs (LP: #305264) - Deprecate X.509 validation chains using MD5 and MD2 signatures - Accept chains where intermediary certs are trusted (LP: #305264) -- Jamie Strandboge ja...@ubuntu.com Fri, 20 Feb 2009 12:24:43 -0600 ** Changed in: gnutls26 (Ubuntu Intrepid) Status: Fix Committed = Fix Released -- gnutls regression: failure in certificate chain validation https://bugs.launchpad.net/bugs/305264 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openldap in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 305264] Re: gnutls regression: failure in certificate chain validation
Copied gnutls26 2.4.1-1ubuntu0.3 from -proposed to -security and -updates. -- gnutls regression: failure in certificate chain validation https://bugs.launchpad.net/bugs/305264 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openldap in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 305264] Re: gnutls regression: failure in certificate chain validation
This bug was fixed in the package openldap - 2.4.11-0ubuntu6.2 --- openldap (2.4.11-0ubuntu6.2) intrepid-proposed; urgency=low * debian/patches/gnutls-enable-v1-ca-certs: Enable V1 CA certs to be trusted (LP: #305264). -- Mathias Gug math...@ubuntu.com Wed, 25 Mar 2009 12:52:23 -0400 ** Changed in: openldap (Ubuntu Intrepid) Status: Fix Committed = Fix Released -- gnutls regression: failure in certificate chain validation https://bugs.launchpad.net/bugs/305264 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openldap in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 305264] Re: gnutls regression: failure in certificate chain validation
Copied openldap 2.4.11-0ubuntu6.2 from -proposed to -updates. -- gnutls regression: failure in certificate chain validation https://bugs.launchpad.net/bugs/305264 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openldap in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 305264] Re: gnutls regression: failure in certificate chain validation
Just noting for posterity, as of GnuTLS 2.8.0 (released 2009-05-27) you can use %VERIFY_ALLOW_X509_V1_CA_CRT in the TLSCipherSuite options to enable V1 CA certs. I will probably #ifdef the current OpenLDAP patch to turn it off for GnuTLS = 2.8.0. (Haven't decided on best course of action yet, given http://bugs.debian.org/cgi- bin/bugreport.cgi?bug=541256 ) ** Bug watch added: Debian Bug tracker #541256 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=541256 -- gnutls regression: failure in certificate chain validation https://bugs.launchpad.net/bugs/305264 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openldap in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 300205] Re: LTSP + LDAP + Kerberos
thats wrong this problem is only by login with LDM with GDM it works fine but GDM is to slow have big problems with sound and grafik -- LTSP + LDAP + Kerberos https://bugs.launchpad.net/bugs/300205 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to krb5 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 305264] Re: gnutls regression: failure in certificate chain validation
** Branch linked: lp:ubuntu/dapper-security/gnutls12 -- gnutls regression: failure in certificate chain validation https://bugs.launchpad.net/bugs/305264 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openldap in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 256014] Re: escapeshellcmd() security fix generates problems with mediawiki and other web-apps
** Changed in: php5 (Ubuntu) Assignee: Kees Cook (kees) = (unassigned) -- escapeshellcmd() security fix generates problems with mediawiki and other web-apps https://bugs.launchpad.net/bugs/256014 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 372757] Re: quagga: Assertion `len str_size' failed in file bgp_aspath.c, line 619
http://www.ubuntu.com/usn/usn-775-2 ** Changed in: quagga (Ubuntu Dapper) Status: Fix Committed = Fix Released -- quagga: Assertion `len str_size' failed in file bgp_aspath.c, line 619 https://bugs.launchpad.net/bugs/372757 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to quagga in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 336554] Re: Use of uninitialized value $_[0] in pattern match (m//) at /usr/share/perl5/Geo/IPfree.pm line 80.
** Changed in: awstats (Ubuntu Karmic) Assignee: (unassigned) = Kees Cook (kees) -- Use of uninitialized value $_[0] in pattern match (m//) at /usr/share/perl5/Geo/IPfree.pm line 80. https://bugs.launchpad.net/bugs/336554 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to awstats in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 336554] Re: Use of uninitialized value $_[0] in pattern match (m//) at /usr/share/perl5/Geo/IPfree.pm line 80.
** Description changed: % /usr/lib/cgi-bin/awstats.pl -config=awstats -update /dev/null Use of uninitialized value $_[0] in pattern match (m//) at /usr/share/perl5/Geo/IPfree.pm line 80. # lsb_release -rd /usr/bin/lsb_release:81: DeprecationWarning: the sets module is deprecated import sets Description: Ubuntu jaunty (development branch) Release: 9.04 # apt-cache policy libgeo-ipfree-perl libgeo-ipfree-perl: Installiert: 0.4-1 Kandidat: 0.4-1 Versions-Tabelle: *** 0.4-1 0 500 http://de.archive.ubuntu.com jaunty/universe Packages 100 /var/lib/dpkg/status IMPACT: every execution of awstats spews warnings (filling logs, cron email, etc) ADDRESSED: fixed in Debian to correctly initialize Geo::IPfree PATCH: attached - TEST CASE: /usr/lib/cgi-bin/awstats.pl -config=awstats -update /dev/null REGRESSION POTENTIAL: very low: 1 line patch to correct the initialization + TEST CASE: + sudo apt-get -y install awstats libgeo-ipfree-perl + sudo sed -i -e 's/^#LoadPlugin=geoipfree/LoadPlugin=geoipfree/' /etc/awstats/awstats.conf + sudo sed -i -e 's/^SiteDomain=/SiteDomain=localhost/' /etc/awstats/awstats.conf + /usr/lib/cgi-bin/awstats.pl -config=awstats -update /dev/null + expected output: (none) + currently: + Use of uninitialized value $_[0] in pattern match (m//) at /usr/share/perl5/Geo/IPfree.pm line 80. -- Use of uninitialized value $_[0] in pattern match (m//) at /usr/share/perl5/Geo/IPfree.pm line 80. https://bugs.launchpad.net/bugs/336554 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to awstats in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 386246] Re: /etc/cron.d/awstats is preconfigured for apache1 not apache2
While awstast 6.9~dfsg-1ubuntu1 partly takes care of bug #319871 it doesn't fix this bug. /etc/cron.d/awstats is still checking for /var/log/apache/access.log being readable. ** Changed in: awstats (Ubuntu) Importance: Undecided = Low ** Changed in: awstats (Ubuntu) Status: Fix Released = Confirmed -- /etc/cron.d/awstats is preconfigured for apache1 not apache2 https://bugs.launchpad.net/bugs/386246 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to awstats in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 336554] Re: Use of uninitialized value $_[0] in pattern match (m//) at /usr/share/perl5/Geo/IPfree.pm line 80.
Using Jaunty Jackalope I was able to recreate this bug using awstats version awstats_6.7.dfsg-5.1. Then after installing awstats from Jaunty proposed, 6.7.dfsg-5.1ubuntu0.1, the bug was resolved. ** Tags added: verification-done ** Tags removed: verification-needed -- Use of uninitialized value $_[0] in pattern match (m//) at /usr/share/perl5/Geo/IPfree.pm line 80. https://bugs.launchpad.net/bugs/336554 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to awstats in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 248213] Re: awstats.pl cronjob spawns too many instances resulting in very high load average
I can confirm this potential issue even in Karmic and awstats 6.9~dfsg- 1ubuntu1. @papukaija: I would say the original reporter already have provided the relevant set of information. This being a rather general and easy to reproduce, the helpful thing would have been to self check out the status in Karmic. ** Changed in: awstats (Ubuntu) Status: Incomplete = Confirmed -- awstats.pl cronjob spawns too many instances resulting in very high load average https://bugs.launchpad.net/bugs/248213 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to awstats in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 336554] Re: Use of uninitialized value $_[0] in pattern match (m//) at /usr/share/perl5/Geo/IPfree.pm line 80.
This bug was fixed in the package awstats - 6.7.dfsg-5.1ubuntu0.1 --- awstats (6.7.dfsg-5.1ubuntu0.1) jaunty-proposed; urgency=low * Add 1011_geoipfree.patch: fix geoipfree warnings backported from Debian (LP: #336554, debian bug 512373). -- Kees Cook k...@ubuntu.com Sat, 09 May 2009 13:10:26 -0700 ** Changed in: awstats (Ubuntu Jaunty) Status: Fix Committed = Fix Released -- Use of uninitialized value $_[0] in pattern match (m//) at /usr/share/perl5/Geo/IPfree.pm line 80. https://bugs.launchpad.net/bugs/336554 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to awstats in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 248213] Re: awstats.pl cronjob spawns too many instances resulting in very high load average
** Changed in: awstats (Ubuntu) Importance: Undecided = Low -- awstats.pl cronjob spawns too many instances resulting in very high load average https://bugs.launchpad.net/bugs/248213 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to awstats in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 248213] Re: awstats.pl cronjob spawns too many instances resulting in very high load average
@Steven: The option EnableLockForUpdate might be a solution for you? ** Bug watch added: Debian Bug tracker #224506 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=224506 ** Also affects: awstats (Debian) via http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=224506 Importance: Unknown Status: Unknown -- awstats.pl cronjob spawns too many instances resulting in very high load average https://bugs.launchpad.net/bugs/248213 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to awstats in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 248213] Re: awstats.pl cronjob spawns too many instances resulting in very high load average
** Changed in: awstats (Debian) Status: Unknown = New -- awstats.pl cronjob spawns too many instances resulting in very high load average https://bugs.launchpad.net/bugs/248213 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to awstats in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 319871] Re: suboptimal defaults in awstats (LogFile and LogFormat)
The LogFile issue is resolved as of Karmic awstats 6.9~dfsg-1ubuntu1. Regarding the LogFormat there is a http://bugs.debian.org/cgi- bin/bugreport.cgi?bug=399029 In regards to file ownership of /var/log/apache2/access.log as well as the use running the cron job a sane default setting might not be entirely obvious. See the discussion in in http://bugs.debian.org/cgi- bin/bugreport.cgi?bug=396452 for more information. ** Bug watch added: Debian Bug tracker #399029 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=399029 ** Bug watch added: Debian Bug tracker #396452 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=396452 ** Also affects: awstats (Debian) via http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=399029 Importance: Unknown Status: Unknown -- suboptimal defaults in awstats (LogFile and LogFormat) https://bugs.launchpad.net/bugs/319871 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to awstats in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 412533] Re: Add patch from ssh bug #69 for non-X askpass support
** Bug watch added: OpenSSH Portable Bugzilla #69 https://bugzilla.mindrot.org/show_bug.cgi?id=69 ** Also affects: openssh via https://bugzilla.mindrot.org/show_bug.cgi?id=69 Importance: Unknown Status: Unknown ** Changed in: openssh (Ubuntu) Importance: Undecided = Wishlist -- Add patch from ssh bug #69 for non-X askpass support https://bugs.launchpad.net/bugs/412533 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openssh in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 319871] Re: suboptimal defaults in awstats (LogFile and LogFormat)
** Changed in: awstats (Debian) Status: Unknown = New -- suboptimal defaults in awstats (LogFile and LogFormat) https://bugs.launchpad.net/bugs/319871 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to awstats in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 412533] Re: Add patch from ssh bug #69 for non-X askpass support
** Changed in: openssh Status: Unknown = Confirmed -- Add patch from ssh bug #69 for non-X askpass support https://bugs.launchpad.net/bugs/412533 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openssh in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 392521] Re: Segmentation fault when running any script
Confirmed on Ubuntu 9.04 Jaunty amd64. Steps to reproduce (and capture a backtrace) are: # Ensure we dump core ulimit -c 200 # Delete any pre-existing core file rm core # Create a command input file for use by gdb echo bt /tmp/bt # Create a trivial PHP script echo -e ?php\n?\n /tmp/a.php # Check it 100 times for i in `seq 1 100` ; do php -l /tmp/a.php /dev/null; done # Run GDB to capture the backtrace gdb -batch -x /tmp/bt `which php` core # Clean up temp files rm core /tmp/bt /tmp/a.php Backtrace attached. It might be worth trying it with a debug version of PHP if this backtrace is insufficient. ** Attachment added: phpbacktrace.txt http://launchpadlibrarian.net/30287189/phpbacktrace.txt -- Segmentation fault when running any script https://bugs.launchpad.net/bugs/392521 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 392521] Re: Segmentation fault when running any script
Since two people other than the original reporter have now reproduced this bug, I am setting its status to confirmed. ** Changed in: php5 (Ubuntu) Status: Incomplete = Confirmed -- Segmentation fault when running any script https://bugs.launchpad.net/bugs/392521 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 392521] Re: Segmentation fault when using php -l to validate any PHP script
** Summary changed: - Segmentation fault when running any script + Segmentation fault when using php -l to validate any PHP script -- Segmentation fault when using php -l to validate any PHP script https://bugs.launchpad.net/bugs/392521 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 392521] Re: Segmentation fault when running any script
Just a quick note to add that this problem also happens if the file (a.php) is completely empty (zero-length). -- Segmentation fault when using php -l to validate any PHP script https://bugs.launchpad.net/bugs/392521 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 300205] Re: LTSP + LDAP + Kerberos
Ok, please provide a full description of the problem, step by step. ** Changed in: krb5 (Ubuntu) Status: Invalid = Incomplete -- LTSP + LDAP + Kerberos https://bugs.launchpad.net/bugs/300205 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to krb5 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 300205] Re: LTSP + LDAP + Kerberos
Seems related to the ldm package. Reassigning to the ldm package. ** Package changed: krb5 (Ubuntu) = ldm (Ubuntu) -- LTSP + LDAP + Kerberos https://bugs.launchpad.net/bugs/300205 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to krb5 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs