** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-3555
--
Missing dependency for apache2 init script
https://bugs.launchpad.net/bugs/460692
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to apache2 in ubuntu.
--
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-0434
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-0408
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-3555
--
apache2.conf missing many language encodings
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-3555
--
Apache Web DAV incorrect permissions
https://bugs.launchpad.net/bugs/540747
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to apache2 in ubuntu.
--
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-3555
--
CustomLog directive in apache2.conf makes it impossible to change default
logging without editing the global config.
https://bugs.launchpad.net/bugs/507616
You received this bug notification because you are a member
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-3555
--
apxs failure regarding httpd.conf and LoadModule
https://bugs.launchpad.net/bugs/500703
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to apache2 in ubuntu.
** Affects: openssl (Ubuntu)
Importance: Undecided
Status: Fix Released
** Affects: apache2 (Ubuntu Lucid)
Importance: Undecided
Assignee: Marc Deslauriers (mdeslaur)
Status: In Progress
** Affects: openssl (Ubuntu Lucid)
Importance: Undecided
Assignee
Updates are being worked on and will be released shortly.
** Visibility changed to: Public
** Package changed: ubuntu = openldap (Ubuntu)
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-0211
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-0212
**
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
pwgen uses urandom, so you might as well simply switch to /dev/urandom.
Although less ideal than using /dev/random, it is probably okay for
generating initial 8-character passwords.
--
ldapadduser adds the user and hangs
https://bugs.launchpad.net/bugs/602540
You received this bug notification
As discussed on irc, I now recommend we use pwgen, so we don't drain the
entropy, and we make sure we have a password that has the correct
length.
--
ldapadduser adds the user and hangs
https://bugs.launchpad.net/bugs/602540
You received this bug notification because you are a member of Ubuntu
This appears to be related to the apparmor profile in libvirt.
** Package changed: virt-manager (Ubuntu) = libvirt (Ubuntu)
** Tags added: apparmor
** Changed in: libvirt (Ubuntu)
Assignee: (unassigned) = Jamie Strandboge (jdstrand)
** Changed in: libvirt (Ubuntu)
Status:
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Here a patch that should fix this. It will stop php from mmaping large
files. It may not be the approach upstream would like.
** Patch added: fix-big-files.patch
http://launchpadlibrarian.net/51984002/fix-big-files.patch
--
PHP5 under Apache2 on 64 bit system is not completely 64 bit
Well, it's not completely arbitrary. It's the size that was used
previous to php 5.2.10. See _php_stream_mmap_range() in
main/streams/mmap.c.
In my limited testing, it does solve the issue. Unfortunately, it also
has the side effect of re-introducing php bug #48309 for files over 4MB.
Maybe
The virt-manager upload to maverick didn't actually fix it for tcsh.
** Changed in: virt-manager (Ubuntu Maverick)
Status: Fix Released = Confirmed
** Bug watch added: Red Hat Bugzilla #614420
https://bugzilla.redhat.com/show_bug.cgi?id=614420
** Also affects: virt-manager via
FYI, this is probably what caused the regression, but reverting it
wouldn't be a proper fix:
http://svn.php.net/viewvc?view=revisionrevision=280678
--
PHP5 under Apache2 on 64 bit system is not completely 64 bit
https://bugs.launchpad.net/bugs/564920
You received this bug notification because
** Also affects: libvirt (Ubuntu)
Importance: Undecided
Status: New
** Changed in: libvirt (Ubuntu Lucid)
Assignee: (unassigned) = Marc Deslauriers (mdeslaur)
** Changed in: libvirt (Ubuntu Maverick)
Assignee: (unassigned) = Marc Deslauriers (mdeslaur)
** Changed in: libvirt
Build this with -O0 makes the test suite work again.
--
m2crypto fails to build from source in maverick
https://bugs.launchpad.net/bugs/600549
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to m2crypto in ubuntu.
--
Ubuntu-server-bugs
Disregard my previous comment, -O0 doesn't change anything.
--
m2crypto fails to build from source in maverick
https://bugs.launchpad.net/bugs/600549
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to m2crypto in ubuntu.
--
Looks like this is failing with openssl 0.9.8o
--
m2crypto fails to build from source in maverick
https://bugs.launchpad.net/bugs/600549
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to m2crypto in ubuntu.
--
Ubuntu-server-bugs mailing
@glance: please open a new bug for that. Thanks.
** Tags removed: regression-potential
--
remotely executed netcat (nc) uses -q option which is not universally supported
https://bugs.launchpad.net/bugs/517478
You received this bug notification because you are a member of Ubuntu
Server Team,
Thanks for reporting this.
The README.FALSE-POSITIVES file does document that dhcp will come up as
a false positive.
Although chkrootkit does display dhcpd3, the cron.daily job in the
chkrootkit package filters it out before sending the report.
What version were you running before that makes
oh, sorry about that...the cron job doesn't filter the report, it just
reformats the dhcp warning so it's always the same and the dhcp line
doesn't get reported more than once if DIFF_MODE=true in
/etc/chkrootkit.conf.
** Bug watch added: Debian Bug tracker #225827
** Package changed: virt-manager (Ubuntu) = libvirt (Ubuntu)
--
virt-manager cannot start VMs on lucid with v2.6.35 maverick kernel
https://bugs.launchpad.net/bugs/602308
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to libvirt in ubuntu.
*** This bug is a duplicate of bug 599450 ***
https://bugs.launchpad.net/bugs/599450
looks like a dupe of #599450
--
virt-manager cannot start VMs on lucid with v2.6.35 maverick kernel
https://bugs.launchpad.net/bugs/602308
You received this bug notification because you are a member of
*** This bug is a duplicate of bug 599450 ***
https://bugs.launchpad.net/bugs/599450
** This bug has been marked a duplicate of bug 599450
[apparmor] getattr handled incorrectly in 2.6.35-6.7
--
virt-manager cannot start VMs on lucid with v2.6.35 maverick kernel
Thanks for the verification Jean-Baptiste. I have uploaded
0.47-1.1ubuntu0.3 to -proposed with the suggested manpage change.
--
[SRU] chkrootkit falsely flags files owned by Firefox 3 and Sun Java 6 valid
packages
https://bugs.launchpad.net/bugs/575945
You received this bug notification because
SRU Request:
Impact: chkrootkit tool reports false positives in hardy, and the option
to ignore certain known false positives is only present in later
versions. This impacts the usefulness of the tool.
This has been addressed by backporting the -e option from the newer
release to let
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-0745
--
1.2.x versions before 1.2.11 are vulnerable to DoS attack
https://bugs.launchpad.net/bugs/536695
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to dovecot in
Thanks for reporting this issue.
The default apparmor profile for the freshclam binary doesn't contain
rules for scripts added to the /etc/clamav/onupdateexecute.d directory
as we can't predict what those scripts will be doing.
You can fix this is one of three ways:
1- Modify the
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
clamav-daemon dosen't start with ERROR: initgroups() failed.
https://bugs.launchpad.net/bugs/579661
You received this bug notification because you are a member of Ubuntu
Server Team, which is
** Changed in: chkrootkit (Ubuntu)
Status: Confirmed = Incomplete
--
chkrootkit falsely flags files owned by Firefox 3 and Sun Java 6 valid packages
https://bugs.launchpad.net/bugs/575945
You received this bug notification because you are a member of Ubuntu
Server Team, which is
** Changed in: opie (Ubuntu Karmic)
Status: Confirmed = Incomplete
--
opiepasswd does not always generate valid seeds
https://bugs.launchpad.net/bugs/569292
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to opie in ubuntu.
--
This is a well-known issue, and is mentioned in
/usr/share/doc/chkrootkit/README.FALSE-POSITIVES and in the upstream
FAQ: http://www.chkrootkit.org/faq/#8
Simply put, chkrootkit should not contain a whitelist of acceptable
dotfiles by default, as a rootkit could simply use the files listed in
the
I have uploaded chkrootkit packages for hardy that contain the patch to
my PPA here:
https://launchpad.net/~mdeslaur/+archive/testing
Please test and leave feedback. Once it's been tested, I'll start the
SRU procedures, although it may not be accepted.
--
chkrootkit falsely flags files owned
Status: New
** Also affects: opie (Ubuntu Maverick)
Importance: Medium
Assignee: Marc Deslauriers (mdeslaur)
Status: Confirmed
--
opiepasswd does not always generate valid seeds
https://bugs.launchpad.net/bugs/569292
You received this bug notification because you are a member
Possible fix?
http://www.inner.net/pub/opie/test/opie-2.4.1-test1-fixes.diff
** Also affects: opie (Ubuntu Jaunty)
Importance: Undecided
Status: New
** Changed in: opie (Ubuntu Karmic)
Status: New = Confirmed
** Changed in: opie (Ubuntu Lucid)
Status: New = Confirmed
Thanks for reporting this issue.
What version of Ubuntu are you running? What version of the opie-server
package are you using?
** Changed in: opie (Ubuntu)
Assignee: (unassigned) = Marc Deslauriers (mdeslaur)
--
opiepasswd does not always generate valid seeds
https://bugs.launchpad.net
Public bug reported:
When starting a VM with virt-manager and using SDL graphics, I get an
apparmor deny message for sys_ptrace.
/usr/bin/apparmor_notify
Profile: libvirt-0ae9a4cf-2e46-3df2-7559-c53176c0682e
Operation: capable
Name: sys_ptrace
Logfile: /var/log/kern.log
AppArmor denial: 1
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Changed in: clamav (Ubuntu)
Status: New = Confirmed
** Changed in: clamav (Ubuntu)
Importance: Undecided = Wishlist
--
For a real-time protection in clamav
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
This is the way the upstream Samba project chose to fix this issue. See:
http://www.samba.org/samba/history/samba-3.4.6.html
and
https://bugzilla.samba.org/show_bug.cgi?id=7104
Unfortunately, there is no simple way to fix the issue without altering
some setups.
We prefer to disable wide links
This is probably a dupe/related to #553081
--
[lucid] Stuttering/skipping mouse with Lucid guest
https://bugs.launchpad.net/bugs/560377
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu-kvm in ubuntu.
--
Ubuntu-server-bugs mailing
Great! I'm marking this bug as fixed.
** Changed in: libvirt (Ubuntu)
Status: Incomplete = Fix Released
** Changed in: virt-manager (Ubuntu)
Status: Incomplete = Fix Released
--
virt-manager can't open Linux VM's under Xen
https://bugs.launchpad.net/bugs/338283
You received this
Could you please attach your /etc/libvirt/qemu.conf and
/etc/libvirt/libvirtd.conf files?
--
SDL support broken when using apparmor
https://bugs.launchpad.net/bugs/545426
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to libvirt in ubuntu.
I get this also.
** Changed in: vm-builder (Ubuntu)
Status: New = Confirmed
** Changed in: vm-builder (Ubuntu)
Importance: Undecided = Medium
--
vmbuilder uses parted to create disk images, which leads to broken sector
counts (cannot use grub2 on disk images created by
I can confirm this on Lucid.
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Tags added: karmic
** This bug has been flagged as a security vulnerability
** Changed in: apache2 (Ubuntu)
Status: New = Confirmed
** Changed in: apache2
Thanks for reporting this.
The apache2 config file has the following:
Allow from 127.0.0.0/255.0.0.0 ::1/128
So, it's not a security issue. Closing the bug.
** Changed in: apache2 (Ubuntu Karmic)
Status: New = Invalid
** Changed in: apache2 (Ubuntu Lucid)
Status: Confirmed =
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
openssl 0.9.8m is not in lucid yet for compatibility reasons. It is
pretty late in the dev cycle to update to 0.9.8m now. It would risk
breaking renegotiation for servers that need it.
For that reason, I don't think pulling in apache 2.2.15 would be
feasible at this time.
--
consider a newer
Starting with samba 3.4.6, wide links gets disabled automatically if
unix extensions are enabled. This is by design to resolve a security
issue.
See:
http://www.samba.org/samba/history/samba-3.4.6.html
and
https://bugzilla.samba.org/show_bug.cgi?id=7104
and
/dev/fb* probably shouldn't be in the apparmor profile. I don't think
setting up a graphical VM interface on a server without X is
appropriate.
@Ancoron: What graphical environment are you using? If you do sudo
gedit, does gedit display on your screen?
--
SDL support broken
The version of virt-manager in lucid doesn't pass the -k parameter when
starting kvm anymore, as recent kvm shouldn't require specifying a
keyboard. This issue should therefore be fixed in virt-manager.
** Changed in: virt-manager (Ubuntu)
Status: Confirmed = Fix Released
--
[patch?]
This is actually a qemu-kvm bug.
** Changed in: virt-manager (Ubuntu)
Status: Incomplete = Confirmed
** Changed in: virt-manager (Ubuntu)
Importance: Low = Wishlist
** Package changed: virt-manager (Ubuntu) = qemu-kvm (Ubuntu)
--
Virt- manager grabs mouse when you press ctrl-alt
The only change in P1 is a fix for the security issue. This needs to go
in.
+1 from me.
--
Please sync bind 9.7.0.dfsg.P1-1 from debian
https://bugs.launchpad.net/bugs/530107
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to bind9 in
*** This bug is a duplicate of bug 537685 ***
https://bugs.launchpad.net/bugs/537685
** Visibility changed to: Public
** This bug has been marked a duplicate of bug 537685
perl crashed with SIGSEGV
--
chsecurity
https://bugs.launchpad.net/bugs/537715
You received this bug notification
** Visibility changed to: Public
** Changed in: dovecot (Ubuntu)
Status: New = Confirmed
--
1.2.x versions before 1.2.11 are vulnerable to DoS attack
https://bugs.launchpad.net/bugs/536695
You received this bug notification because you are a member of Ubuntu
Server Team, which is
@Seb: you seem to have a different issue. If you still have it and can
reproduce it, please open a new bug.
** Changed in: libvirt (Ubuntu)
Status: Incomplete = Invalid
** Changed in: virt-manager (Ubuntu)
Status: New = Invalid
--
Unable to complete install 'class
We are closing this bug report because it lacks the information we need
to investigate the problem, as described in the previous comments.
Please reopen it if you can give us the missing information, and don't
hesitate to submit bug reports in the future. To reopen the bug report
you can click on
@zigi:
Thanks for testing, I'll upload it today.
off topic: This link has the info you are looking for:
https://wiki.ubuntu.com/UbuntuDevelopment
--
remotely executed netcat (nc) uses -q option which is not universally supported
https://bugs.launchpad.net/bugs/517478
You received this bug
** Bug watch added: Red Hat Bugzilla #570629
https://bugzilla.redhat.com/show_bug.cgi?id=570629
** Also affects: libvirt via
https://bugzilla.redhat.com/show_bug.cgi?id=570629
Importance: Unknown
Status: Unknown
--
remotely executed netcat (nc) uses -q option which is not
I've built updated libvirt packages in my testing PPA that should fix
this:
https://launchpad.net/~mdeslaur/+archive/testing
Please test them and indicate here if they solve the issue for you.
Thanks
--
remotely executed netcat (nc) uses -q option which is not universally supported
I would like to see 9.7 get in the LTS release for maintenance purposes.
+1 from me
--
Please sync bind 9.7.0.dfsg-1 from debian
https://bugs.launchpad.net/bugs/530107
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to bind9 in ubuntu.
--
** Attachment added: Dependencies.txt
http://launchpadlibrarian.net/39889041/Dependencies.txt
** Attachment added: ProcAttrCurrent.gz
http://launchpadlibrarian.net/39889042/ProcAttrCurrent.gz
** Attachment added: ProcMaps.txt
http://launchpadlibrarian.net/39889043/ProcMaps.txt
**
Sorry, I still have the same problem with python-vm-builder
0.12.1-0ubuntu1:
Traceback (most recent call last):
File /usr/bin/vmbuilder, line 24, in module
cli.main()
File /usr/lib/python2.6/dist-packages/VMBuilder/contrib/cli.py, line 103,
in main
distro.build_chroot()
File
** Attachment added: Dependencies.txt
http://launchpadlibrarian.net/39790996/Dependencies.txt
** Attachment added: ProcMaps.txt
http://launchpadlibrarian.net/39790997/ProcMaps.txt
** Attachment added: ProcStatus.txt
http://launchpadlibrarian.net/39790998/ProcStatus.txt
** Attachment
Standard practice would be to display the ssh key's fingerprint and ask
the user to validate it before importing it automatically.
--
ssh-import-id: retrieve a key from a public keyserver and add to the
authorized_keys file
https://bugs.launchpad.net/bugs/524226
You received this bug
Dustin,
Now that you've removed the ability to specify an arbitrary URL, I think
that's a fair assumption.
--
ssh-import-id: retrieve a key from a public keyserver and add to the
authorized_keys file
https://bugs.launchpad.net/bugs/524226
You received this bug notification because you are a
en_US.utf8 is a valid locale, but is not in a format locale-gen
recognizes. Vm-builder shouldn't use locale-gen to validate the locale
specified by the user.
--
vmbuilder aborts with locale-gen does not recognize your locale
https://bugs.launchpad.net/bugs/523589
You received this bug
Public bug reported:
Trying to create a new vm, I get the following:
2010-02-17 22:01:03,177 DEBUG : add_part - begin 0, length 4096, end 4095
2010-02-17 22:01:03,177 DEBUG : add_part - begin 4096, length 1024, end 5119
2010-02-17 22:01:03,177 DEBUG : ip: dhcp
2010-02-17 22:01:03,182 DEBUG
** Attachment added: Dependencies.txt
http://launchpadlibrarian.net/39342051/Dependencies.txt
--
vmbuilder aborts with locale-gen does not recognize your locale
https://bugs.launchpad.net/bugs/523589
You received this bug notification because you are a member of Ubuntu
Server Team, which is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
That's a bug in jaunty's libvirt.
This is the upstream patch that fixes it:
http://libvirt.org/git/?p=libvirt.git;a=commit;h=9fa79000ecc883c699a6cb1ce7f00c34881bc8fe
** Package changed: virt-manager (Ubuntu) = libvirt (Ubuntu)
--
Unable to create virtual machine: unknown parameter 'fmt'
** Package changed: virt-manager (Ubuntu) = libvirt (Ubuntu)
** Summary changed:
- virt-manager conflicts with existing dnsmasq installation
+ libvirt conflicts with existing dnsmasq installation
--
libvirt conflicts with existing dnsmasq installation
https://bugs.launchpad.net/bugs/500484
You
This is actually a libvirt bug.
** Package changed: virt-manager (Ubuntu) = libvirt (Ubuntu)
--
USB passthrough device ID interpreted as decimal instead of hex
https://bugs.launchpad.net/bugs/514610
You received this bug notification because you are a member of Ubuntu
Server Team, which is
*** This bug is a duplicate of bug 510732 ***
https://bugs.launchpad.net/bugs/510732
** Visibility changed to: Public
** This bug has been marked a duplicate of bug 510732
OpenSSH server sshd_config PermitRootLogin - NO
--
OpenSSH server sshd_config PermitRootLogin - NO
Thanks for taking the time to report this bug and helping to make Ubuntu
better. This is not a bug, but rather expected behavior:
https://wiki.ubuntu.com/SecurityTeam/FAQ#SSH
Please feel free to report any other bugs you may find.
** Visibility changed to: Public
** This bug is no longer
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Visibility changed to: Public
** Changed in: clamav (Ubuntu)
Importance: Undecided = Low
** Changed in: clamav (Ubuntu)
Status: New = Confirmed
--
clamscan crashes if started with umask u=rw,go= on x64
https://bugs.launchpad.net/bugs/512209
You received this bug notification
In Ubuntu, the php imap plugin is in a separate php-imap source package.
Although USN-628-1 says CVE-2008-2829 was fixed, it was a mistake. The
actual binary isn't built from the php5 source package.
CVE-2008-2829 needs to be fixed in the php-imap source package that's in
universe.
** Package
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Your bug report is more likely to get attention if it is made in
English, since this is the language understood by the majority of Ubuntu
developers. Additionally, please only mark a bug as security if it
shows
*** This bug is a duplicate of bug 501807 ***
https://bugs.launchpad.net/bugs/501807
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Tags added: karmic
** This bug has been marked a duplicate of bug 501807
actualizacion para reproducir un
** Changed in: php5 (Ubuntu)
Assignee: (unassigned) = Marc Deslauriers (mdeslaur)
--
PHP 5.2.4-2ubuntu5.9 Possible exploit using directory traversal
https://bugs.launchpad.net/bugs/491835
You received this bug notification because you are a member of Ubuntu
Server Team, which is a direct
Thanks for reporting this issue.
I can't seem to reproduce this with a fresh installation of php
5.2.4-2ubuntu5.9 on hardy.
Where is your web root located, so I can try with the same directory as
you? (you've got a lot of ../../../../ there...)
What type of filesystem is your server using?
Is
Could you please attach your /etc/php5/apache2/php.ini file, I still
can't reproduce this issue.
--
PHP 5.2.4-2ubuntu5.9 Possible exploit using directory traversal
https://bugs.launchpad.net/bugs/491835
You received this bug notification because you are a member of Ubuntu
Server Team, which is a
/usr/local/Zend/etc/php.ini? That's not the file from the libapache2
-mod-php5 package...
Could you attach the result of phpinfo(), please?
--
PHP 5.2.4-2ubuntu5.9 Possible exploit using directory traversal
https://bugs.launchpad.net/bugs/491835
You received this bug notification because you
No problem, thanks.
** Changed in: php5 (Ubuntu)
Status: New = Invalid
--
PHP 5.2.4-2ubuntu5.9 Possible exploit using directory traversal
https://bugs.launchpad.net/bugs/491835
You received this bug notification because you are a member of Ubuntu
Server Team, which is a direct
Just released them:
http://www.ubuntu.com/usn/USN-862-1
** Visibility changed to: Public
** Changed in: php5 (Ubuntu)
Status: New = Fix Released
--
php5 multiple security vulnerability : CVE-2009-2626 CVE-2009-2687
CVE-2009-3291 CVE-2009-3292
https://bugs.launchpad.net/bugs/488833
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-3291
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-3292
--
[ffe] security upgrade to php 5.2.11
https://bugs.launchpad.net/bugs/446313
You received this bug notification because you are a member of
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Changed in: tomcat6 (Ubuntu)
Status: Confirmed = Fix Released
--
CVE-2009-0781: XSS in tomcat6 and tomcat5.5
https://bugs.launchpad.net/bugs/341278
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to tomcat6 in ubuntu.
--
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-5161
** Summary changed:
- Security flaw in openSSH prior to 5.2
+ CVE-2008-5161: OpenSSH CBC plaintext recovery
--
CVE-2008-5161: OpenSSH CBC plaintext recovery
https://bugs.launchpad.net/bugs/379329
You received this bug
Public bug reported:
Binary package hint: freeradius
freeradius refuses to start without the freeradius-mysql package being
installed:
From the output of freeradius -X:
{snip}
including configuration file /etc/freeradius/modules/acct_unique
including configuration file
Public bug reported:
Binary package hint: freeradius
The radclient tool in freeradius doesn't work:
# radtest testuser testpass localhost 10 testing123
radclient: socket: cannot initialize udpfromto: Function not implemented
** Affects: freeradius (Ubuntu)
Importance: Undecided
This is an issue in intrepid, jaunty and karmic.
--
freeradius config needs freeradius-mysql
https://bugs.launchpad.net/bugs/430730
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to freeradius in ubuntu.
--
Ubuntu-server-bugs mailing list
This affects jaunty and karmic.
Intrepid is ok.
--
radclient doesn't work
https://bugs.launchpad.net/bugs/430732
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to freeradius in ubuntu.
--
Ubuntu-server-bugs mailing list
This is still broken in Intrepid.
--
freeradius init script not consistent with radiusd.conf
https://bugs.launchpad.net/bugs/367769
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to freeradius in ubuntu.
--
Ubuntu-server-bugs mailing list
501 - 600 of 638 matches
Mail list logo