Public bug reported:
I'm running nagios 3.2.3-3ubuntu1 on 64 bit Ubuntu 12.04.
I've turned on regular expression matching in /etc/nagios3/nagios.cfg with the
line:
use_regexp_matching=1
If I have some hosts defined like this in a file in /etc/nagios3/conf.d:
define host{
use
Sorry, Luca, yes - we have tested your patch and it worked fine for one
user! We are just waiting for other user accounts to expire...
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba in Ubuntu.
https://bugs.launchpad.net/bugs/1003
A pal spotted this bug report and suggests "[this] is caused by vsftp
switching pid namespaces (audit kernel code prohibits)". Hope this
helps.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to vsftpd in Ubuntu.
https://bugs.launchpad.ne
** Changed in: php5 (Debian)
Status: Won't Fix => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in Ubuntu.
https://bugs.launchpad.net/bugs/771662
Title:
php5 segfault when zend guard loader used
To manage
Can you also test the latest v3.8.4 stable kernel?
http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.8.4-raring/
If the bug still exits in 3.8.4, we will need to perform a reverse
bisect to identify the commit that fixes in this bug in v3.9-rc4.
--
You received this bug notification because you a
It's not related to the Debian bug mentioned. See the reporter's
comment below.
** Changed in: php5 (Debian)
Importance: Unknown => Undecided
** Changed in: php5 (Debian)
Status: Fix Released => New
** Changed in: php5 (Debian)
Remote watch: Debian Bug tracker #402181 => None
--
Yo
** Changed in: php5 (Debian)
Status: Won't Fix => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in Ubuntu.
https://bugs.launchpad.net/bugs/418220
Title:
apache2 crashed with SIGSEGV in pdo_parse_params()
T
This is fixed now: http://www.ubuntu.com/usn/usn-1783-1/
** Project changed: bind => bind9 (Ubuntu)
** Changed in: bind9 (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to bind9 in Ubuntu.
htt
*** This bug is a security vulnerability ***
You have been subscribed to a public security bug:
See https://kb.isc.org/article/AA-00871
** Affects: bind9 (Ubuntu)
Importance: Undecided
Status: New
** Tags: lucid oneiric precise quantal raring
--
CVE-2013-2266: A Maliciously Craf
Changed to reflect upstream package, as the issue is not an Ubuntu
issue, it is prevalent in all UNIX and UNIX compatible builds of BIND
** Package changed: bind9 (Ubuntu) => bind
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to bind9 i
Thanks, we had just noticed that too.
This has been fixed (in the last few days) in the upstream tree and in
the ubuntu-lxc daily ppa. 0.9 will be released next week, and the fix
will come in with the merge of that.
status: fixcommitted
importance: medium
** Changed in: lxc (Ubuntu)
Impor
Public bug reported:
In the man page of lxc-start-ephemeral the option '-n' is documented:
SYNOPSIS
lxc-start-ephemeral [-o] [-n] [-d] [--bdir] [--user] [--key]
[--union-type] [--keep-data] [COMMAND]
[...]
[-n] Name of the ephemeral container (defaults to a random suffix).
But t
Moving to Ubuntu packaging
** Project changed: nova => nova (Ubuntu)
** Changed in: nova (Ubuntu)
Status: Incomplete => New
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1161338
You have been subscribed to a public bug:
Following an upgrade yesterday to python-nova 1:2013.1~rc1-0, we started
getting "Interface eth1 not found" errors in nova-network.log (relevant
logs below). This turned out to be a call to ebtables that was failing
(because it wasn't installed).
There s
** Tags added: lucid oneiric precise quantal raring
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to bind9 in Ubuntu.
https://bugs.launchpad.net/bugs/1161794
Title:
CVE-2013-2266: A Maliciously Crafted Regular Expression Can Cause
M
*** This bug is a security vulnerability ***
Public security bug reported:
See https://kb.isc.org/article/AA-00871
** Affects: bind9 (Ubuntu)
Importance: Undecided
Status: New
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2266
** Information type changed f
16 matches
Mail list logo