[Bug 366034] Re: fglrx doesn't turn off displays with dpms
*** This bug is a duplicate of bug 363059 *** https://bugs.launchpad.net/bugs/363059 ** This bug has been marked a duplicate of bug 363059 [jaunty] dpms does not switch off backlight on laptop screen -- fglrx doesn't turn off displays with dpms https://bugs.launchpad.net/bugs/366034 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 363059] Re: [jaunty] dpms does not switch off backlight on laptop screen
Also affects Radeon HD 3300 video card on 64bit Jaunty. This is definitely shaping up to be an fglrx bug. -- [jaunty] dpms does not switch off backlight on laptop screen https://bugs.launchpad.net/bugs/363059 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 361632] Re: The Evolution calendars have quit unexpectedly
This issue is still affecting me as well. I have installed all updates from jaunty-proposed. Since this isn't technically a crash, I'm not sure how to get the proper data to debug. -- The Evolution calendars have quit unexpectedly https://bugs.launchpad.net/bugs/361632 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 183685] Re: compiz.real crashed with SIGSEGV
https://bugs.launchpad.net/bugs/183685 Log in and click on "unsubscribe" in the right column. On Fri, Oct 3, 2008 at 11:31 AM, Robin <[EMAIL PROTECTED]> wrote: > seriously some admin please remove me from this mailing list > > CAREFACE > > -- > compiz.real crashed with SIGSEGV > https://bugs.launchpad.net/bugs/183685 > You received this bug notification because you are a direct subscriber > of the bug. > > Status in Collection of plugins from OpenCompositing for Compiz: Unknown > Status in "compiz-fusion-plugins-main" source package in Ubuntu: Fix > Released > > Bug description: > Binary package hint: compiz > > it just crashed for some unknown reason. > > ProblemType: Crash > Architecture: amd64 > Date: Wed Jan 16 22:19:09 2008 > DistroRelease: Ubuntu 8.04 > ExecutablePath: /usr/bin/compiz.real > NonfreeKernelModules: nvidia > Package: compiz-core 1:0.6.99+git20080102-0ubuntu4 > PackageArchitecture: amd64 > ProcCmdline: /usr/bin/compiz.real --ignore-desktop-hints --replace > --loose-binding --sm-client-id default0 ccp > ProcCwd: /home/hardaway > ProcEnviron: > > PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games > LANG=C > SHELL=/bin/bash > Signal: 11 > SourcePackage: compiz > StacktraceTop: > ?? () from /usr/lib/compiz/libworkarounds.so > ?? () from /usr/lib/compiz/libworkarounds.so > ?? () from /usr/lib/compiz/libezoom.so > ?? () from /usr/lib/compiz/libvpswitch.so > ?? () from /usr/lib/compiz/libfade.so > Title: compiz.real crashed with SIGSEGV > Uname: Linux ubuntu 2.6.24-4-generic #1 SMP Mon Jan 14 18:19:11 UTC 2008 > x86_64 GNU/Linux > UserGroups: adm admin audio cdrom dialout dip floppy lpadmin netdev plugdev > scanner video > -- compiz.real crashed with SIGSEGV https://bugs.launchpad.net/bugs/183685 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 410616] [NEW] package linux-image-2.6.28-15-generic 2.6.28-15.48 failed to install/upgrade: subprocess post-installation script returned error exit status 1
Public bug reported: Accidentally clicked cancel in debconf while trying to sort out changes to menu.lst. ProblemType: Package Architecture: amd64 DistroRelease: Ubuntu 9.04 ErrorMessage: subprocess post-installation script returned error exit status 1 HibernationDevice: RESUME=UUID=a8cff13e-ec61-4b03-8da4-3af8468ab0ce MachineType: Gigabyte Technology Co., Ltd. GA-MA790GP-UD4H NonfreeKernelModules: fglrx Package: linux-image-2.6.28-15-generic 2.6.28-15.48 ProcCmdLine: root=UUID=57e79c50-25bd-4488-8120-a10b0faaeb50 ro quiet splash ProcVersionSignature: Ubuntu 2.6.28-14.47-generic SourcePackage: linux Title: package linux-image-2.6.28-15-generic 2.6.28-15.48 failed to install/upgrade: subprocess post-installation script returned error exit status 1 ** Affects: linux (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-package -- package linux-image-2.6.28-15-generic 2.6.28-15.48 failed to install/upgrade: subprocess post-installation script returned error exit status 1 https://bugs.launchpad.net/bugs/410616 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 410616] Re: package linux-image-2.6.28-15-generic 2.6.28-15.48 failed to install/upgrade: subprocess post-installation script returned error exit status 1
** Attachment added: "BootDmesg.txt" http://launchpadlibrarian.net/30048624/BootDmesg.txt ** Attachment added: "CurrentDmesg.txt" http://launchpadlibrarian.net/30048625/CurrentDmesg.txt ** Attachment added: "Dependencies.txt" http://launchpadlibrarian.net/30048626/Dependencies.txt ** Attachment added: "DpkgTerminalLog.txt" http://launchpadlibrarian.net/30048627/DpkgTerminalLog.txt ** Attachment added: "HalComputerInfo.txt" http://launchpadlibrarian.net/30048628/HalComputerInfo.txt ** Attachment added: "Lspci.txt" http://launchpadlibrarian.net/30048629/Lspci.txt ** Attachment added: "Lsusb.txt" http://launchpadlibrarian.net/30048630/Lsusb.txt ** Attachment added: "ProcCpuinfo.txt" http://launchpadlibrarian.net/30048631/ProcCpuinfo.txt ** Attachment added: "ProcInterrupts.txt" http://launchpadlibrarian.net/30048632/ProcInterrupts.txt ** Attachment added: "ProcModules.txt" http://launchpadlibrarian.net/30048633/ProcModules.txt -- package linux-image-2.6.28-15-generic 2.6.28-15.48 failed to install/upgrade: subprocess post-installation script returned error exit status 1 https://bugs.launchpad.net/bugs/410616 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 386132] Re: Firefox 3.5 and up renders certain graphics with wrong colors (for gfx.color_management.mode = 2) (8.632)
8.64.3 has resolved the problem for me as well running ATI HD3300. -- Firefox 3.5 and up renders certain graphics with wrong colors (for gfx.color_management.mode = 2) (8.632) https://bugs.launchpad.net/bugs/386132 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 386132] Re: Firefox 3.5 and up renders certain graphics with wrong colors (for gfx.color_management.mode = 2) (8.632)
I can confirm the problem in Jaunty with 8.63.2 and it also affects JPEGs in the system as well as videos playing in totem (not just Firefox). -- Firefox 3.5 and up renders certain graphics with wrong colors (for gfx.color_management.mode = 2) (8.632) https://bugs.launchpad.net/bugs/386132 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 405667] Re: gnome-keyring-daemon crashed with signal 5 in g_thread_join()
Crashes on login every time I start up. -- gnome-keyring-daemon crashed with signal 5 in g_thread_join() https://bugs.launchpad.net/bugs/405667 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 193702] Re: Desktop effects could not be enabled. Hardy Heron Alpha 4
This bug is still present in Hardy final version. I am willing to debug if someone can give me steps. -- Desktop effects could not be enabled. Hardy Heron Alpha 4 https://bugs.launchpad.net/bugs/193702 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 209520] Re: SMB error: Unable to mount location
I am also having this problem. Clean installation of Hardy shows no shares available on a Windows file server. Used to work fine with this particular file server under Gutsy. -- SMB error: Unable to mount location https://bugs.launchpad.net/bugs/209520 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 196832] [NEW] RAID array on Promise FastTrak detected as separate drives
Public bug reported: When installing Ubuntu Server i386 via CD-ROM, my RAID 2+0 array is not detected as 1 drive, but as two separate drives. These are 2 IDE drives attached. This also results in GRUB failing to boot after the installer is complete. My RAID controller is a Promise FastTrak133 (PDC20277) which is onboard my Intel SE7501WV2 server motherboard. lspci reports the following about my controller: 01:01.0 RAID bus Controller: Promise Technology, Inc. PDC20277 (SBFastTrak133te)(rev 01) I suspect this bug belongs in the kernel, but I am not intimately familar with Ubuntu's package structure. I am also not sure how to proceed debugging this issue since my experience with RAID has mainly been plug and play. I am willing to debug if someone can provide me with instructions. I also tried this on hardy rc5 and got the same result. ** Affects: ubuntu Importance: Undecided Status: New -- RAID array on Promise FastTrak detected as separate drives https://bugs.launchpad.net/bugs/196832 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 196832] Re: RAID array on Promise FastTrak detected as separate drives
** Description changed: When installing Ubuntu Server i386 via CD-ROM, my RAID 2+0 array is not detected as 1 drive, but as two separate drives. These are 2 IDE drives attached. This also results in GRUB failing to boot after the installer is complete. - My RAID controller is a Promise FastTrak133 (PDC20277) which is onboard - my Intel SE7501WV2 server motherboard. + The RAID controller is a Promise FastTrak133 (PDC20277) which is onboard + an Intel SE7501WV2 server motherboard. lspci reports the following about my controller: - 01:01.0 RAID bus Controller: Promise Technology, Inc. PDC20277 (SBFastTrak133te)(rev 01) + 01:02.0 RAID bus Controller: Promise Technology, Inc. PDC20277 (SBFastTrak133te)(rev 01) I suspect this bug belongs in the kernel, but I am not intimately familar with Ubuntu's package structure. I am also not sure how to proceed debugging this issue since my experience with RAID has mainly been plug and play. I am willing to debug if someone can provide me with instructions. I also tried this on hardy rc5 and got the same result. -- RAID array on Promise FastTrak detected as separate drives https://bugs.launchpad.net/bugs/196832 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 519062] Re: Unable to connect to Eucalyptus Service on port 8773
I am getting the same exception while trying to access my API endpoint for use with ElasticFox. I followed the instructions on the wiki for the CDInstall under 10.04 and euca-describe-availability-zones verbose shows good output. Please let me know if you would like any information from my environment to debug the issue. -- Unable to connect to Eucalyptus Service on port 8773 https://bugs.launchpad.net/bugs/519062 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 531709] Re: ubuntu one client crashes on context menu click
** Attachment added: "oauth-login.log" http://launchpadlibrarian.net/40938447/oauth-login.log -- ubuntu one client crashes on context menu click https://bugs.launchpad.net/bugs/531709 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 531709] Re: ubuntu one client crashes on context menu click
The syncdaemon debug log is attached. There were no syncdaemon exceptions when the applet crashed. This is reproduced by clicking "connect" on the applet and then after about a minute or two of no activity, clicking again on the applet. ** Attachment added: "syncdaemon.log" http://launchpadlibrarian.net/40436040/syncdaemon.log -- ubuntu one client crashes on context menu click https://bugs.launchpad.net/bugs/531709 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 531709] [NEW] ubuntu one client crashes on context menu click
Public bug reported: Binary package hint: ubuntuone-client Applet crashes when right clicking. ProblemType: Bug .home.brian..cache.ubuntuone.log.syncdaemon.exceptions.log: .home.brian..config.ubuntuone.ubuntuone.client.conf: [ubuntuone] bookmarked = False connected = True connect = 0 show_applet = 1 Architecture: i386 Date: Wed Mar 3 23:09:04 2010 DistroRelease: Ubuntu 9.10 InstallationMedia: Ubuntu-Netbook-Remix 9.10 "Karmic Koala" - Release i386 (20091028.4) Package: ubuntuone-client 1.0.3-0ubuntu1 PackageArchitecture: all ProcEnviron: LANG=en_US.UTF-8 SHELL=/bin/bash ProcVersionSignature: Ubuntu 2.6.31-19.56-generic SourcePackage: ubuntuone-client Tags: ubuntu-unr Uname: Linux 2.6.31-19-generic i686 ** Affects: ubuntuone-client (Ubuntu) Importance: Undecided Status: New ** Tags: apport-bug i386 ubuntu-unr -- ubuntu one client crashes on context menu click https://bugs.launchpad.net/bugs/531709 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 531709] Re: ubuntu one client crashes on context menu click
** Attachment added: ".home.brian..cache.ubuntuone.log.oauth.login.log.txt" http://launchpadlibrarian.net/40126494/.home.brian..cache.ubuntuone.log.oauth.login.log.txt ** Attachment added: "Dependencies.txt" http://launchpadlibrarian.net/40126495/Dependencies.txt ** Attachment added: "UbuntuoneClientPackages.txt" http://launchpadlibrarian.net/40126496/UbuntuoneClientPackages.txt ** Attachment added: "XsessionErrors.txt" http://launchpadlibrarian.net/40126497/XsessionErrors.txt -- ubuntu one client crashes on context menu click https://bugs.launchpad.net/bugs/531709 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 470776] Re: retry remote devices when parent is ready after SIGUSR1
I was running into this issue on Karmic and now I have tried Lucid Beta 1. The behavior here is a little different because the shares do mount on startup, but error messages are still displayed in the terminal. mount.nfs: DNS resolution failed for : Name or service not known mountall: mount /media/mount [930] terminated with status 32 The release notes for this fix state that it should fail silently. This could be very misleading in an LTS release. Is my observed behavior intended, or is this a regression in Beta 1? -- retry remote devices when parent is ready after SIGUSR1 https://bugs.launchpad.net/bugs/470776 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 470776] Re: retry remote devices when parent is ready after SIGUSR1
Thanks for the helpful info. I'll make sure to report back after that package is updated. -- retry remote devices when parent is ready after SIGUSR1 https://bugs.launchpad.net/bugs/470776 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1891953] Re: CVE-2019-8936
Patch for Focal ** Patch added: "Patch for Focal" https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1891953/+attachment/5438836/+files/1-ntp_4.2.8p12+dfsg-3ubuntu5.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1891953 Title: CVE-2019-8936 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1891953/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1891953] Re: CVE-2019-8936
@alexmurray - The debdiff for Groovy is identical to the one from Focal (same source package version). Let me know if you need a distinct debdiff with the release pocket (groovy-security) identified. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1891953 Title: CVE-2019-8936 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1891953/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1891953] Re: CVE-2019-8936
@alexmurray - Yes, I'll work on it this week. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1891953 Title: CVE-2019-8936 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1891953/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1613737] Re: Proftpd - MLSD lines not properly terminated with CRLF
Verified successfully in 1.3.5a-1ubuntu0.1 Command: MLSD Status: Data connection established. Reply: 150 Opening BINARY mode data connection for MLSD Listing: modify=20181119215133;perm=fle;type=pdir;unique=9AU7A5;UNIX.group=0;UNIX.mode=0755;UNIX.owner=0; .. Reply: 226 Transfer complete Status: Success ** Tags removed: verification-needed-xenial ** Tags added: verification-done-xenial ** Tags removed: removal-candidate verification-needed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1613737 Title: Proftpd - MLSD lines not properly terminated with CRLF To manage notifications about this bug go to: https://bugs.launchpad.net/proftpd-dfsg/+bug/1613737/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1770481] Re: core: fall back to bind-mounts for PrivateDevices= execution environments
Confirmed problem on Ubuntu 16.04 host running 16.04 container with a packaged version of Proxysql2. Changing PrivateDevices to "no" allows the service to start. ``` [Unit] Description=High Performance Advanced Proxy for MySQL After=network.target [Service] Type=forking RuntimeDirectory=proxysql ExecStart=/usr/bin/proxysql -c /etc/proxysql.cnf PIDFile=/var/lib/proxysql/proxysql.pid SyslogIdentifier=proxysql Restart=no User=proxysql Group=proxysql PermissionsStartOnly=true UMask=0007 LimitNOFILE=102400 LimitCORE=1073741824 ProtectHome=yes NoNewPrivileges=true CapabilityBoundingSet=CAP_SETGID CAP_SETUID CAP_SYS_RESOURCE RestrictAddressFamilies=AF_INET AF_INET6 AF_UNIX AF_ALG ProtectSystem=full PrivateDevices=yes [Install] Alias=proxysql WantedBy=multi-user.target ``` -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1770481 Title: core: fall back to bind-mounts for PrivateDevices= execution environments To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1770481/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1891953] Re: CVE-2019-8936
Hi Alex, thanks very much for fixing that loose end in the changelog and for sponsoring this fix. I can produce them for the other releases as well. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1891953 Title: CVE-2019-8936 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1891953/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1891953] Re: CVE-2019-8936
Requires security backport for Bionic only. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1891953 Title: CVE-2019-8936 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1891953/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1891953] [NEW] CVE-2019-8936
Public bug reported: It was discovered that the fix for CVE-2018-7182 introduced a NULL pointer dereference into NTP. An attacker could use this vulnerability to cause a denial of service (crash). https://people.canonical.com/~ubuntu- security/cve/2019/CVE-2019-8936.html ** Affects: ntp (Ubuntu) Importance: Undecided Assignee: Brian Morton (rokclimb15) Status: In Progress ** Changed in: ntp (Ubuntu) Assignee: (unassigned) => Brian Morton (rokclimb15) ** Changed in: ntp (Ubuntu) Status: New => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1891953 Title: CVE-2019-8936 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1891953/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1891953] Re: CVE-2019-8936
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-8936 ** Information type changed from Public to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1891953 Title: CVE-2019-8936 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1891953/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1891953] Re: CVE-2019-8936
** Patch added: "Debdiff for Bionic" https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1891953/+attachment/5402291/+files/1-4.2.8p10+dfsg-5ubuntu7.3.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1891953 Title: CVE-2019-8936 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1891953/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 1630413] Re: segfault in server/mpm/event/event.c:process_socket
Andreas, I think patching this in Ubuntu only rather than upstream makes sense for the reasons you've outlined. However, I would prefer that someone with more Apache experience reviewed the fix. Thanks, Brian On Fri, Dec 7, 2018 at 10:21 AM Christophe Meron <1630...@bugs.launchpad.net> wrote: > Unfortunately, not really > > I can argue on why we use Trusty: as we deploy storage software which > runs for years in controlled environment, we never upgrade OSes to new > releases. Our older platforms are still on Trusty and that makes sense > to me. > > But that doesn't make an argument to why they should fix an old version > of apache. > > We can workaround our issue by using backports or hand-made packages. > But as it seems to affect anyone using MPM + a not so heavy parallel > workload, it seems worth fixing this in the distribution by default > > -- > You received this bug notification because you are subscribed to the bug > report. > https://bugs.launchpad.net/bugs/1630413 > > Title: > segfault in server/mpm/event/event.c:process_socket > > Status in apache2 package in Ubuntu: > Triaged > > Bug description: > We have seen consistent but infrequent segfaults of apache on a trusty > production server with 2.4.7-1ubuntu4.13 (for more examples, see [1]) > > --- > Oct 2 19:01:03 static kernel: [8029151.932468] apache2[10642]: segfault > at 7fac797803a8 ip 7fac90b345e0 sp 7fac84ff8e20 error 6 in > mod_mpm_event.so[7fac90b2e000+d000] > --- > > Taking the ip - base seems to put us at a consistent offset > > --- > (gdb) p/x 0x7fac90b345e0 - 0x7fac90b2e000 > $1 = 0x65e0 > > $ addr2line -e ./mod_mpm_event.so 0x65e0 > /build/apache2-Rau9Dr/apache2-2.4.7/server/mpm/event/event.c:1064 > --- > > which is at the bottom of process_socket(), which looks like > > --- > 1058 /* > 1059 * Prevent this connection from writing to our connection > state after it > 1060 * is no longer associated with this thread. This would > happen if the EOR > 1061 * bucket is destroyed from the listener thread due to a > connection abort > 1062 * or timeout. > 1063 */ > 1064 c->sbh = NULL; > 1065 return; > 1066 } > --- > > 1064 seems at least plausible as a faulting location... > > Some digging through httpd history reveals that this assignment was > removed on the 2.4 branch with commit [2], which seems to be largely > based on [3]. Things have been shuffled around so much it's hard to > tell exactly what might have avoided us going down this path. Even so > I'm honestly not sure how to reproduce it -- on a fairly busy server > it's seen at most a few times a day. > > [1] http://paste.openstack.org/show/584330/ > [2] > https://github.com/apache/httpd/commit/043eba1a0a190829c073d9ef084358f6693dbbd2 > [3] > https://github.com/apache/httpd/commit/285e67883e396f97dc3aad50d9dc345f15220827 > > To manage notifications about this bug go to: > > https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1630413/+subscriptions > -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1630413 Title: segfault in server/mpm/event/event.c:process_socket To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1630413/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 1630413] Re: segfault in server/mpm/event/event.c:process_socket
Ah, that makes sense. On Mon, Dec 10, 2018 at 6:50 AM Andreas Hasenack wrote: > > However, I would prefer that someone with more Apache experience > reviewed the fix. > > Right, that was actually my (very unclear, sorry) point when I commented > on upstream's interest in this, since they would be experienced > reviewers. > > -- > You received this bug notification because you are subscribed to the bug > report. > https://bugs.launchpad.net/bugs/1630413 > > Title: > segfault in server/mpm/event/event.c:process_socket > > Status in apache2 package in Ubuntu: > Triaged > > Bug description: > We have seen consistent but infrequent segfaults of apache on a trusty > production server with 2.4.7-1ubuntu4.13 (for more examples, see [1]) > > --- > Oct 2 19:01:03 static kernel: [8029151.932468] apache2[10642]: segfault > at 7fac797803a8 ip 7fac90b345e0 sp 7fac84ff8e20 error 6 in > mod_mpm_event.so[7fac90b2e000+d000] > --- > > Taking the ip - base seems to put us at a consistent offset > > --- > (gdb) p/x 0x7fac90b345e0 - 0x7fac90b2e000 > $1 = 0x65e0 > > $ addr2line -e ./mod_mpm_event.so 0x65e0 > /build/apache2-Rau9Dr/apache2-2.4.7/server/mpm/event/event.c:1064 > --- > > which is at the bottom of process_socket(), which looks like > > --- > 1058 /* > 1059 * Prevent this connection from writing to our connection > state after it > 1060 * is no longer associated with this thread. This would > happen if the EOR > 1061 * bucket is destroyed from the listener thread due to a > connection abort > 1062 * or timeout. > 1063 */ > 1064 c->sbh = NULL; > 1065 return; > 1066 } > --- > > 1064 seems at least plausible as a faulting location... > > Some digging through httpd history reveals that this assignment was > removed on the 2.4 branch with commit [2], which seems to be largely > based on [3]. Things have been shuffled around so much it's hard to > tell exactly what might have avoided us going down this path. Even so > I'm honestly not sure how to reproduce it -- on a fairly busy server > it's seen at most a few times a day. > > [1] http://paste.openstack.org/show/584330/ > [2] > https://github.com/apache/httpd/commit/043eba1a0a190829c073d9ef084358f6693dbbd2 > [3] > https://github.com/apache/httpd/commit/285e67883e396f97dc3aad50d9dc345f15220827 > > To manage notifications about this bug go to: > > https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1630413/+subscriptions > -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1630413 Title: segfault in server/mpm/event/event.c:process_socket To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1630413/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1630413] Re: segfault in server/mpm/event/event.c:process_socket
Hi Christophe, Sorry for the delay. Apparently I wasn't getting these notifications for some reason. I'm not well versed enough with Docker to set up an environment to reproduce. I use LXD almost exclusively. Does the crash occur in your Docker container with my patched PPA build? Andreas seems to indicate that it's fixed by the PPA build. Is there any non-default configuration you're running? Andreas, it might be worth getting a review from someone better versed in Apache internals if possible. I just took an educated guess about the problem based on the traceback. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1630413 Title: segfault in server/mpm/event/event.c:process_socket To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1630413/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1630413] Re: segfault in server/mpm/event/event.c:process_socket
Thanks for the clarification Christophe. So it sounds like the fix addresses the problem. I think the patch in that PPA should get more review from an Apache developer before it is used further. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1630413 Title: segfault in server/mpm/event/event.c:process_socket To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1630413/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1613737] Re: Proftpd - MLSD lines not properly terminated with CRLF
Hi Simon, Thanks for your notes. I've attached a new patch and I'm adding SRU justification to the description now. ** Patch removed: "Xenial debdiff" https://bugs.launchpad.net/ubuntu/+source/proftpd-dfsg/+bug/1613737/+attachment/5017207/+files/proftpd-dfsg_1.3.5a-1build2.debdiff ** Attachment removed: "Test log after patch" https://bugs.launchpad.net/ubuntu/+source/proftpd-dfsg/+bug/1613737/+attachment/5017210/+files/goodtest.txt ** Patch added: "Xenial debdiff" https://bugs.launchpad.net/ubuntu/+source/proftpd-dfsg/+bug/1613737/+attachment/5070320/+files/proftpd-dfsg_1.3.5a-1.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1613737 Title: Proftpd - MLSD lines not properly terminated with CRLF To manage notifications about this bug go to: https://bugs.launchpad.net/proftpd-dfsg/+bug/1613737/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1613737] Re: Proftpd - MLSD lines not properly terminated with CRLF
** Description changed: + [Impact] + + * A bug exists in Proftpd version 1.3.5a. which causes FTP sessions to + fail or timeout with strict clients + + * The package, as published in LTS, does not comply with the FTP + protocol + + * Ported upstream patch and test changes + + [Test Case] + + * Connect to an affected server with ftptest.net + + * Prior to the patch, it will fail to perform an MLSD command with an + explicit error and explanation + + * After the patch, this works as expected + + [Regression Potential] + + * Failures in SSL connection handling + A bug exists in Proftpd version 1.3.5a. which causes ssl sessions to fail or timeout with some clients Excerpt from http://bugs.proftpd.org/show_bug.cgi?id=4202 Server seems to send an improperly formatted response causing some clients to time out. Log from ftptest.net: [snip] Command: TYPE I Reply: 200 Type set to I Command: EPSV Reply: 229 Entering Extended Passive Mode (|||45766|) Command: MLSD Status: Data connection established. Reply: 150 Opening BINARY mode data connection for MLSD Error: Malformed directory listing Error: Line feed received without preceding carriage return This bug has been fixed upstream in version 1.3.5b I recommend getting this fixed this is causing a lot of havoc with my servers I've had to delay my rollout of 16.04 because of this. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1613737 Title: Proftpd - MLSD lines not properly terminated with CRLF To manage notifications about this bug go to: https://bugs.launchpad.net/proftpd-dfsg/+bug/1613737/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1304760] Re: checkinstall fails to add files to dpkg conffiles
Debdiff for Trusty and all newer releases. ** Patch added: "Debdiff for trusty and newer" https://bugs.launchpad.net/debian/+source/checkinstall/+bug/1304760/+attachment/4791416/+files/checkinstall_1.6.2-4ubuntu2.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1304760 Title: checkinstall fails to add files to dpkg conffiles To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/checkinstall/+bug/1304760/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1383704] Re: Can't switch off SSLv3 cipher groups in haproxy
Nominating this for wontfix since security support has ended for releases with haproxy >= 1.5 and <= 1.5.7. Everything earlier doesn't have SSL support built-in, and everything later is unsupported or has received the upstream fix. The solution is to upgrade to trusty and use backports or upgrade to xenial or newer. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1383704 Title: Can't switch off SSLv3 cipher groups in haproxy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/haproxy/+bug/1383704/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1582708] Re: HAproxy 1.6.3 mail alerts on DOWN but not UP
This is interesting since the bug was fixed in 1.6-dev2. https://github.com/haproxy/haproxy/commit/4cd477f3721f6a3fe7cf55ae729388bf7f279331 There are two curious conditions in the code: if (s->admin & SRV_ADMF_MAINT) return; if (s->state == SRV_ST_STARTING || s->state == SRV_ST_RUNNING) return; Basically, if the server is in maintenance mode or is still starting, it bails out. But that should preclude the UP logging you see. Can you confirm the server in question isn't in maintenance mode? I might try to reproduce this with gdb running to debug. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1582708 Title: HAproxy 1.6.3 mail alerts on DOWN but not UP To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/haproxy/+bug/1582708/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1597450] Re: mod-gnutls FTBFS: test failure: apache2 seg fault
0.7.5 was removed from yakkety-proposed, but the FTBFS continues in Zesty. Here's a backtrace and disassembly on i386. If anyone has ideas, I'd appreciate them. ** Tags added: zesty ** Attachment added: "gdb bt of core dump" https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1597450/+attachment/4791780/+files/Document.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1597450 Title: mod-gnutls FTBFS: test failure: apache2 seg fault To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1597450/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1630413] Re: segfault in server/mpm/event/event.c:process_socket
Hi Ian, can you raise ulimit, add CoreDumpDirectory, and install apache2-dbg (will restart to make prior two changes effective)? If you make CoreDumpDirectory /tmp, make sure to move your core dump out of the way before you reboot. https://httpd.apache.org/dev/debugging.html#crashes Then you'll get a core dump for analysis. If you post it here I can analyze further. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1630413 Title: segfault in server/mpm/event/event.c:process_socket To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1630413/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 1597450] Re: mod-gnutls FTBFS: test failure: apache2 seg fault
Adam, Thanks for the idea, that's helpful and makes sense. I checked the debian build logs for libapache2-mod-gnutls, p11-kit, softhsm2, and glibc. They're all built with stack-protector-strong. On Tue, May 30, 2017 at 3:39 PM, Adam Conrad wrote: > The difference between Ubuntu and Debian could simply be that Ubuntu > defaults to -fstack-protector-strong and Debian might still not. > > -- > You received this bug notification because you are subscribed to the bug > report. > https://bugs.launchpad.net/bugs/1597450 > > Title: > mod-gnutls FTBFS: test failure: apache2 seg fault > > Status in apache2 package in Ubuntu: > Confirmed > Status in mod-gnutls package in Ubuntu: > Confirmed > > Bug description: > mod-gnutls 0.7.5-2 in yakkety fails to build on all architectures > except amd64: > > https://launchpad.net/ubuntu/+source/mod-gnutls/0.7.5-2/ > > FAIL: test-24_pkcs11_cert.bash > == > > Generated temporary SoftHSM config mod_gnutls_test-BtVH7L.conf: > objectstore.backend = file > directories.tokendir = /«PKGBUILDDIR»/test/server/softhsm2.db > checking /usr/lib64/pkcs11/libsofthsm2.so ... > checking /usr/lib/softhsm/libsofthsm2.so ... > found! > TESTING: 24_pkcs11_cert > ./runtests failed at line 188! > FAILURE: 24_pkcs11_cert > httpd (no pid file) not running > > Apache error logs: > [Wed Jun 29 17:23:26.375898 2016] [core:notice] [pid 12681:tid > 4148214336] AH00060: seg fault or similar nasty error detected in the > parent process > FAIL test-24_pkcs11_cert.bash (exit status: 1) > > To manage notifications about this bug go to: > https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/ > 1597450/+subscriptions > -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1597450 Title: mod-gnutls FTBFS: test failure: apache2 seg fault To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1597450/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1324828] Re: Unable to use unix socket in ProxyPassMatch directive
As a workaround for trusty, you can use unix:///run/php-fpm/php- fpm.sock|fcgi://127.0.0.1:9000/srv/http/ (notice the triple slash on the unix socket). Only problem then is the length of the variable https://bz.apache.org/bugzilla/show_bug.cgi?id=53218 ** Bug watch added: bz.apache.org/bugzilla/ #53218 https://bz.apache.org/bugzilla/show_bug.cgi?id=53218 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1324828 Title: Unable to use unix socket in ProxyPassMatch directive To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1324828/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1668474] [NEW] AH00526 when using long ProxyPass worker name
Public bug reported: When using a long ProxyPass worker name such as unix:///var/php- fpm/146527084714328.sock|fcgi://localhost/home/mysite/domains/subdomain.com/public_html/$1 Apache issues the fatal error AH00526 and refuses to proceed during reload. This is a typical configuration generated by Virtualmin for a subdomain running php-fpm. A couple of workarounds are available using mod_rewrite, but they do not use connection pooling for the proxy and aren't available for packaged solutions like Virtualmin. The patch from trunk is fairly straightforward. ** Affects: apache2 Importance: Unknown Status: Unknown ** Affects: apache2 (Ubuntu) Importance: Undecided Status: New ** Bug watch added: bz.apache.org/bugzilla/ #53218 https://bz.apache.org/bugzilla/show_bug.cgi?id=53218 ** Also affects: apache2 via https://bz.apache.org/bugzilla/show_bug.cgi?id=53218 Importance: Unknown Status: Unknown -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1668474 Title: AH00526 when using long ProxyPass worker name To manage notifications about this bug go to: https://bugs.launchpad.net/apache2/+bug/1668474/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1668474] Re: AH00526 when using long ProxyPass worker name
** Changed in: apache2 (Ubuntu) Assignee: (unassigned) => Brian Morton (rokclimb15) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1668474 Title: AH00526 when using long ProxyPass worker name To manage notifications about this bug go to: https://bugs.launchpad.net/apache2/+bug/1668474/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1668474] Re: AH00526 when using long ProxyPass worker name
Patch attached for trusty. Unsure how to generate a debdiff in this case. ** Patch added: "Patch for trusty" https://bugs.launchpad.net/apache2/+bug/1668474/+attachment/4827987/+files/mod-proxy-worker-name-size.patch -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1668474 Title: AH00526 when using long ProxyPass worker name To manage notifications about this bug go to: https://bugs.launchpad.net/apache2/+bug/1668474/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1246245] Re: proftpd service fails to restart (including via logrotate)
bmorton@maui:~$ sudo apt-get install proftpd-basic/trusty-proposed Reading package lists... Done Building dependency tree Reading state information... Done Selected version '1.3.5~rc3-2.1ubuntu2.2' (Ubuntu:14.04/trusty-proposed [amd64]) for 'proftpd-basic' Suggested packages: openbsd-inetd inet-superserver proftpd-doc proftpd-mod-ldap proftpd-mod-mysql proftpd-mod-odbc proftpd-mod-pgsql proftpd-mod-sqlite proftpd-mod-geoip The following packages will be upgraded: proftpd-basic 1 upgraded, 0 newly installed, 0 to remove and 13 not upgraded. Need to get 1,967 kB of archives. After this operation, 1,024 B of additional disk space will be used. Get:1 http://archive.ubuntu.com/ubuntu/ trusty-proposed/universe proftpd-basic amd64 1.3.5~rc3-2.1ubuntu2.2 [1,967 kB] Fetched 1,967 kB in 3s (557 kB/s) Preconfiguring packages ... (Reading database ... 1144721 files and directories currently installed.) Preparing to unpack .../proftpd-basic_1.3.5~rc3-2.1ubuntu2.2_amd64.deb ... * Stopping ftp server proftpd [ OK ] Unpacking proftpd-basic (1.3.5~rc3-2.1ubuntu2.2) over (1.3.5~rc3-2.1ubuntu2.1) ... Processing triggers for ureadahead (0.100.0-16) ... Processing triggers for man-db (2.6.7.1-1ubuntu1) ... Setting up proftpd-basic (1.3.5~rc3-2.1ubuntu2.2) ... Installing new version of config file /etc/init.d/proftpd ... * Starting ftp server proftpd [ OK ] Processing triggers for ureadahead (0.100.0-16) ... bmorton@maui:~$ sudo nano /etc/apt/sources.list bmorton@maui:~$ sudo service proftpd restart * Stopping ftp server proftpd [ OK ] * Starting ftp server proftpd [ OK ] bmorton@maui:~$ sudo service proftpd status ProFTPD is started in standalone mode, currently running. ** Tags removed: verification-needed ** Tags added: verification-done -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1246245 Title: proftpd service fails to restart (including via logrotate) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/proftpd-dfsg/+bug/1246245/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1613737] Re: Proftpd - MLSD lines not properly terminated with CRLF
https://github.com/proftpd/proftpd/pull/152 ** Changed in: proftpd-dfsg (Ubuntu) Assignee: (unassigned) => Brian Morton (rokclimb15) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1613737 Title: Proftpd - MLSD lines not properly terminated with CRLF To manage notifications about this bug go to: https://bugs.launchpad.net/proftpd-dfsg/+bug/1613737/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1630413] Re: segfault in server/mpm/event/event.c:process_socket
Thanks for the core dump and bt Christophe. After a bit of research, I believe this is a race condition present in 2.4.7 which was subsequently patched, and then the patch refactored when the suspend/resume hooks were added in 2.4.10. The fix in 2.4.7 seems simply enough (just move c->sbh = NULL into the suspend condition above it) but I don't think it would pass SRU justification since it only happens under load and is hard to reproduce. Can you and/or Ian use 2.4.10 from trusty-backports? That shouldn't suffer from this problem. If not, reply here and I'll get someone to validate my SRU opinion before proceeding. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1630413 Title: segfault in server/mpm/event/event.c:process_socket To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1630413/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1630413] Re: segfault in server/mpm/event/event.c:process_socket
Hi Christophe, I believe I've narrowed down the problem to one fixed in these two changesets: https://github.com/apache/httpd/commit/59eea59c4be383d004e92fa63b57b995e7a8ef01 https://github.com/apache/httpd/commit/285e67883e396f97dc3aad50d9dc345f15220827 The latter only applies to 2.4.10 since it applies to the suspend/resume hooks. That leaves the first one, which I've applied in my PPA for testing. I've started with 2.4.7 since typically backports aren't for bugfixes. Would you mind being my guinea pig? https://launchpad.net/~rokclimb15/+archive/ubuntu/apache2 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1630413 Title: segfault in server/mpm/event/event.c:process_socket To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1630413/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1630413] Re: segfault in server/mpm/event/event.c:process_socket
Hi Christophe, Let's try something completely different. I have a new build uploaded for testing. Thanks, Brian -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1630413 Title: segfault in server/mpm/event/event.c:process_socket To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1630413/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1630413] Re: segfault in server/mpm/event/event.c:process_socket
Fantastic news! My biggest concern now is that my monkey-patch has introduced some unexpected behavior since we don't try to dereference sbh on each read request (only when the connection state is suspended). This is based on my own observation of the problem rather than an upstream patch since all of the fixes rely on APR functionality introduced in 2.4.10. Can you do some parallel tests of functionality in addition to crash testing? Ideally, I would test from two different clients to see if it confuses connection information or something else strange. Assuming it doesn't, I might ask if an Apache dev could review my patch for a sanity check. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1630413 Title: segfault in server/mpm/event/event.c:process_socket To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1630413/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1717356] [NEW] CVE-2016-6298
*** This bug is a security vulnerability *** Public security bug reported: The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in jwcrypto before 0.3.2 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA). https://people.canonical.com/~ubuntu- security/cve/2016/CVE-2016-6298.html ** Affects: python-jwcrypto (Ubuntu) Importance: Undecided Assignee: Brian Morton (rokclimb15) Status: In Progress ** Information type changed from Private Security to Public Security ** Changed in: python-jwcrypto (Ubuntu) Assignee: (unassigned) => Brian Morton (rokclimb15) ** Changed in: python-jwcrypto (Ubuntu) Status: New => In Progress ** Description changed: The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in jwcrypto before 0.3.2 lacks the Random Filling protection mechanism, which - makes it easier for remote attackers to obtain cleartext data via a Million - Message Attack (MMA). + makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA). https://people.canonical.com/~ubuntu- security/cve/2016/CVE-2016-6298.html ** Description changed: The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in - jwcrypto before 0.3.2 lacks the Random Filling protection mechanism, which - makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA). + jwcrypto before 0.3.2 lacks the Random Filling protection mechanism, + which makes it easier for remote attackers to obtain cleartext data via + a Million Message Attack (MMA). https://people.canonical.com/~ubuntu- security/cve/2016/CVE-2016-6298.html ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-6298 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1717356 Title: CVE-2016-6298 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/python-jwcrypto/+bug/1717356/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1717356] Re: CVE-2016-6298
17.04 and 17.10 are not affected since they publish the fixed version 0.3.2. 16.04 appears to be affected, but the code is significantly different. I've requested info from the source project owner to test my proposed patch for 16.04. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1717356 Title: CVE-2016-6298 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/python-jwcrypto/+bug/1717356/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1630413] Re: segfault in server/mpm/event/event.c:process_socket
Hi Christophe, Thanks for your hard work on this one. Unfortunately I can't reproduce the crash with your test. I even raised the file size to 500M, but still nothing. Is there anything I could be missing? Any PPA packages with newer versions of PHP or other Apache modules loaded? root@trusty-mpm-event-crash-test:~# apache2ctl -M Loaded Modules: core_module (static) so_module (static) watchdog_module (static) http_module (static) log_config_module (static) logio_module (static) version_module (static) unixd_module (static) access_compat_module (shared) actions_module (shared) alias_module (shared) auth_basic_module (shared) authn_core_module (shared) authn_file_module (shared) authz_core_module (shared) authz_host_module (shared) authz_user_module (shared) autoindex_module (shared) deflate_module (shared) dir_module (shared) env_module (shared) fastcgi_module (shared) filter_module (shared) mime_module (shared) mpm_event_module (shared) negotiation_module (shared) setenvif_module (shared) status_module (shared) root@trusty-mpm-event-crash-test:~# apache2ctl -S VirtualHost configuration: *:80 trusty-mpm-event-crash-test.lxd (/etc/apache2/sites-enabled/000-default.conf:1) ServerRoot: "/etc/apache2" Main DocumentRoot: "/var/www" Main ErrorLog: "/var/log/apache2/error.log" Mutex watchdog-callback: using_defaults Mutex default: dir="/var/lock/apache2" mechanism=fcntl PidFile: "/var/run/apache2/apache2.pid" Define: DUMP_VHOSTS Define: DUMP_RUN_CFG User: name="www-data" id=33 Group: name="www-data" id=33 root@trusty-mpm-event-crash-test:~# apache2ctl -V Server version: Apache/2.4.7 (Ubuntu) Server built: Jul 27 2017 15:20:24 Server's Module Magic Number: 20120211:27 Server loaded: APR 1.5.1-dev, APR-UTIL 1.5.3 Compiled using: APR 1.5.1-dev, APR-UTIL 1.5.3 Architecture: 64-bit Server MPM: event threaded: yes (fixed thread count) forked: yes (variable process count) Server compiled with -D APR_HAS_SENDFILE -D APR_HAS_MMAP -D APR_HAVE_IPV6 (IPv4-mapped addresses enabled) -D APR_USE_SYSVSEM_SERIALIZE -D APR_USE_PTHREAD_SERIALIZE -D SINGLE_LISTEN_UNSERIALIZED_ACCEPT -D APR_HAS_OTHER_CHILD -D AP_HAVE_RELIABLE_PIPED_LOGS -D DYNAMIC_MODULE_LIMIT=256 -D HTTPD_ROOT="/etc/apache2" -D SUEXEC_BIN="/usr/lib/apache2/suexec" -D DEFAULT_PIDLOG="/var/run/apache2.pid" -D DEFAULT_SCOREBOARD="logs/apache_runtime_status" -D DEFAULT_ERRORLOG="logs/error_log" -D AP_TYPES_CONFIG_FILE="mime.types" -D SERVER_CONFIG_FILE="apache2.conf" -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1630413 Title: segfault in server/mpm/event/event.c:process_socket To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1630413/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1717356] Re: CVE-2016-6298
Tests are here: https://github.com/latchset/jwcrypto/pull/66/commits/b2b66b53bc0df72eb761959fe39700451803d8ab -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1717356 Title: CVE-2016-6298 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/python-jwcrypto/+bug/1717356/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1512068] Re: Python ctypes.util , Shell Injection in find_library()
** Changed in: python2.7 (Ubuntu Xenial) Assignee: (unassigned) => Brian Morton (rokclimb15) ** Changed in: python2.7 (Ubuntu) Assignee: Brian Morton (rokclimb15) => (unassigned) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1512068 Title: Python ctypes.util , Shell Injection in find_library() To manage notifications about this bug go to: https://bugs.launchpad.net/python/+bug/1512068/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1613737] Re: Proftpd - MLSD lines not properly terminated with CRLF
Debdiff attached for Xenial along with before and after patch test logs from ftptest.net ** Patch added: "Xenial debdiff" https://bugs.launchpad.net/ubuntu/+source/proftpd-dfsg/+bug/1613737/+attachment/5017207/+files/proftpd-dfsg_1.3.5a-1build2.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1613737 Title: Proftpd - MLSD lines not properly terminated with CRLF To manage notifications about this bug go to: https://bugs.launchpad.net/proftpd-dfsg/+bug/1613737/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1613737] Re: Proftpd - MLSD lines not properly terminated with CRLF
Test log before patch ** Attachment added: "Test log before patch" https://bugs.launchpad.net/ubuntu/+source/proftpd-dfsg/+bug/1613737/+attachment/5017208/+files/badtest.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1613737 Title: Proftpd - MLSD lines not properly terminated with CRLF To manage notifications about this bug go to: https://bugs.launchpad.net/proftpd-dfsg/+bug/1613737/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1613737] Re: Proftpd - MLSD lines not properly terminated with CRLF
** Attachment added: "Test log after patch" https://bugs.launchpad.net/ubuntu/+source/proftpd-dfsg/+bug/1613737/+attachment/5017209/+files/goodtest.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1613737 Title: Proftpd - MLSD lines not properly terminated with CRLF To manage notifications about this bug go to: https://bugs.launchpad.net/proftpd-dfsg/+bug/1613737/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1613737] Re: Proftpd - MLSD lines not properly terminated with CRLF
** Attachment added: "Test log after patch" https://bugs.launchpad.net/ubuntu/+source/proftpd-dfsg/+bug/1613737/+attachment/5017210/+files/goodtest.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1613737 Title: Proftpd - MLSD lines not properly terminated with CRLF To manage notifications about this bug go to: https://bugs.launchpad.net/proftpd-dfsg/+bug/1613737/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1246245] Re: proftpd service fails to restart (including via logrotate)
** Changed in: proftpd-dfsg (Ubuntu) Assignee: (unassigned) => Brian Morton (rokclimb15) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1246245 Title: proftpd service fails to restart (including via logrotate) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/proftpd-dfsg/+bug/1246245/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1246245] Re: proftpd service fails to restart (including via logrotate)
Attaching debdiff for trusty. Editing bug to add SRU justification. ** Patch added: "Debdiff for trusty" https://bugs.launchpad.net/ubuntu/+source/proftpd-dfsg/+bug/1246245/+attachment/4817938/+files/proftpd-dfsg_1.3.5~rc3-2.1ubuntu3.debdiff ** Description changed: + [Impact] + + * ProFTPd exits with signal 15 when restarted via init script. +Worse yet, init script returns success. + + * Since logrotate runs via cron and performs a restart, this causes +FTP service to stop and results in unexpected service downtime. + + * Final version of upstream patch at https://anonscm.debian.org/git + /pkg-proftpd/proftpd- + dfsg.git/commit/?id=23c5e44b3c30a082a0e15279961c3c4c3d7393fd + + * Only trusty and prior are affected + + [Test Case] + + * bmorton@maui:~$ sudo service proftpd restart +* Stopping ftp server proftpd [ OK ] +* Starting ftp server proftpd [ OK ] +bmorton@maui:~$ sudo service proftpd status +ProFTPD is started in standalone mode, currently not running. + + * After a restart, status should say "currently running" + + [Regression Potential] + + * Failure to start/stop/restart proftpd service + + * Patched package currently running on production host without issues + + [Other Info] + + * This is a very old bug affecting a substantial number of users + + * Early AM nagios notifications about FTP service are undesirable + + + - + proftpd-basic 1.3.5~rc3-2 from Ubuntu 13.10 proftpd-basic 1.3.5~rc3-2.1ubuntu2 from Ubuntu 14.04 Init script from proftpd-basic package contains the BUG: when you run /etc/init.d/proftpd restart it fails because of there is the race between pidfile removal and start() which checks pidfile existency: --- ProFTPD is started in standalone mode, currently running. root@aa:~# /etc/init.d/proftpd restart * Stopping ftp server proftpd [ OK ] * Starting ftp server proftpd [ OK ] root@aa:~# /etc/init.d/proftpd status ProFTPD is started in standalone mode, currently not running. --- the next workaround helps: --- --- /etc/init.d/proftpd.orig2013-10-30 13:52:46.791265726 +0400 +++ /etc/init.d/proftpd 2013-10-30 13:52:57.456265698 +0400 @@ -107,6 +107,7 @@ fi if [ -f "$PIDFILE" ]; then start-stop-daemon --stop --signal $SIGNAL --quiet --pidfile "$PIDFILE" + sleep 1 if [ $? = 0 ]; then log_end_msg 0 else --- Please, fix. ** Description changed: + SRU request for Trusty + [Impact] - * ProFTPd exits with signal 15 when restarted via init script. -Worse yet, init script returns success. + * ProFTPd exits with signal 15 when restarted via init script. + Worse yet, init script returns success. - * Since logrotate runs via cron and performs a restart, this causes -FTP service to stop and results in unexpected service downtime. + * Since logrotate runs via cron and performs a restart, this causes + FTP service to stop and results in unexpected service downtime. - * Final version of upstream patch at https://anonscm.debian.org/git + * Final version of upstream patch at https://anonscm.debian.org/git /pkg-proftpd/proftpd- dfsg.git/commit/?id=23c5e44b3c30a082a0e15279961c3c4c3d7393fd - * Only trusty and prior are affected + * Only trusty and prior are affected [Test Case] - * bmorton@maui:~$ sudo service proftpd restart -* Stopping ftp server proftpd [ OK ] -* Starting ftp server proftpd [ OK ] -bmorton@maui:~$ sudo service proftpd status -ProFTPD is started in standalone mode, currently not running. + * bmorton@maui:~$ sudo service proftpd restart + * Stopping ftp server proftpd [ OK ] + * Starting ftp server proftpd [ OK ] + bmorton@maui:~$ sudo service proftpd status + ProFTPD is started in standalone mode, currently not running. - * After a restart, status should say "currently running" + * After a restart, status should say "currently running" [Regression Potential] - * Failure to start/stop/restart proftpd service + * Failure to start/stop/restart proftpd service - * Patched package currently running on production host without issues + * Patched package currently running on production host without issues [Other Info] - - * This is a very o
[Bug 1246245] Re: proftpd service fails to restart (including via logrotate)
Revised debdiff with correct changelog message. ** Patch added: "Debdiff for trusty with corrected changelog" https://bugs.launchpad.net/ubuntu/+source/proftpd-dfsg/+bug/1246245/+attachment/4818195/+files/proftpd-dfsg_1.3.5~rc3-2.1ubuntu3.debdiff ** Patch removed: "Debdiff for trusty" https://bugs.launchpad.net/ubuntu/+source/proftpd-dfsg/+bug/1246245/+attachment/4817938/+files/proftpd-dfsg_1.3.5~rc3-2.1ubuntu3.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1246245 Title: proftpd service fails to restart (including via logrotate) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/proftpd-dfsg/+bug/1246245/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1664812] [NEW] CVE-2016-0787
Public bug reported: The diffie_hellman_sha256 and diffie_hellman_sha1 functions in kex.c in libssh2 1.7.0 and prior improperly truncate secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug." ** Affects: libssh2 (Ubuntu) Importance: Undecided Assignee: Brian Morton (rokclimb15) Status: New ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-0787 ** Changed in: libssh2 (Ubuntu) Assignee: (unassigned) => Brian Morton (rokclimb15) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1664812 Title: CVE-2016-0787 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libssh2/+bug/1664812/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1664812] Re: CVE-2016-0787
** Information type changed from Public to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1664812 Title: CVE-2016-0787 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libssh2/+bug/1664812/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1664812] Re: CVE-2016-0787
Debdiff for Yakkety The vuln has no specific known attack methods so there is no public exploit available. Package tests have passed and I used a somewhat unusual method to explicitly regression test. Package php-ssh2 depends on libssh2. 'diffie-hellman-group1-sha1' ); // Make our connection $connection = ssh2_connect($server, 22, $methods); if (!$connection) die('Connection failed'); $methods_neg = ssh2_methods_negotiated($connection); echo "Keys negotiated with: {$methods_neg['kex']}\n"; echo "Client-to-server uses these methods:\n"; echo " Encryption: {$methods_neg["client_to_server"]["crypt"]}\n"; echo " Compression: {$methods_neg["client_to_server"]["comp"]}\n"; echo "Server-to-client uses these methods:\n"; echo " Encryption: {$methods_neg["server_to_client"]["crypt"]}\n"; echo " Compression: {$methods_neg["server_to_client"]["comp"]}\n"; ** Patch added: "Debdiff for yakkety" https://bugs.launchpad.net/ubuntu/+source/libssh2/+bug/1664812/+attachment/4819153/+files/libssh2_1.7.0-1ubuntu0.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1664812 Title: CVE-2016-0787 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libssh2/+bug/1664812/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1664812] Re: CVE-2016-0787
** Changed in: libssh2 (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1664812 Title: CVE-2016-0787 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libssh2/+bug/1664812/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1664812] Re: CVE-2016-0787
Tweaked this debdiff changelog for Zesty upload. Same package version as Yakkety. ** Patch added: "Debdiff for zesty" https://bugs.launchpad.net/ubuntu/+source/libssh2/+bug/1664812/+attachment/4819154/+files/libssh2_1.7.0-1ubuntu0.1.zesty.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1664812 Title: CVE-2016-0787 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libssh2/+bug/1664812/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1664812] Re: CVE-2016-0787
Debdiff for xenial ** Patch added: "Debdiff for xenial" https://bugs.launchpad.net/ubuntu/+source/libssh2/+bug/1664812/+attachment/4819155/+files/libssh2_1.5.0-2ubuntu0.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1664812 Title: CVE-2016-0787 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libssh2/+bug/1664812/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1664812] Re: CVE-2016-0787
No problem, just let me know if they need different versioning because of the potential conflict. I plan to produce one for trusty shortly. At this point, is the team encouraging CVE fixes for precise? This is not easy to exploit, so it might not be worth the review/publishing time. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1664812 Title: CVE-2016-0787 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libssh2/+bug/1664812/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1664812] Re: CVE-2016-0787
Debdiff for trusty ** Patch added: "Debdiff for trusty" https://bugs.launchpad.net/ubuntu/+source/libssh2/+bug/1664812/+attachment/4820419/+files/libssh2_1.4.3-2ubuntu0.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1664812 Title: CVE-2016-0787 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libssh2/+bug/1664812/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1664812] Re: CVE-2016-0787
** Patch added: "Debdiff for precise" https://bugs.launchpad.net/ubuntu/+source/libssh2/+bug/1664812/+attachment/4820426/+files/libssh2_1.2.8-2ubuntu0.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1664812 Title: CVE-2016-0787 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libssh2/+bug/1664812/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1664812] Re: CVE-2016-0787
Seth, sorry about that. I think I was moving a little too quickly on that one. Corrected one attached. ** Patch removed: "Debdiff for trusty" https://bugs.launchpad.net/ubuntu/+source/libssh2/+bug/1664812/+attachment/4820419/+files/libssh2_1.4.3-2ubuntu0.1.debdiff ** Patch added: "Debdiff for trusty" https://bugs.launchpad.net/ubuntu/+source/libssh2/+bug/1664812/+attachment/4821563/+files/libssh2_1.4.3-2ubuntu0.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1664812 Title: CVE-2016-0787 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libssh2/+bug/1664812/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1631104] Re: The LimitNPROC line in /lib/systemd/system/openvpn@.service has to be commented out in order to be able to start OpenVPN
Had the same error, but commenting/adjusting LimitNPROC didn't fix the issue. Ultimately I had to make the container unconfined by AA and privileged to get openvpn to start. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1631104 Title: The LimitNPROC line in /lib/systemd/system/openvpn@.service has to be commented out in order to be able to start OpenVPN To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openvpn/+bug/1631104/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1650202] Re: issubclass(a_type, union_type) has stopped working
This is expected behavior from upstream changes. https://github.com/python/typing/commit/7baf6fe2a6d96ab09c807aac174650baa35d15dd Optional is shorthand for Union, and Union cannot be subclassed. This behavior "worked" before, but was undefined and returned unpredictable results. ** Changed in: python3.5 (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1650202 Title: issubclass(a_type, union_type) has stopped working To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/python3.5/+bug/1650202/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1652113] Re: package maas-rack-controller 2.1.3+bzr5573-0ubuntu1 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1
Ref https://bugs.launchpad.net/ubuntu/+source/python3.5/+bug/1650202 and https://github.com/python/typing/commit/7baf6fe2a6d96ab09c807aac174650baa35d15dd Optional returns a Union, which can't be subclassed. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1652113 Title: package maas-rack-controller 2.1.3+bzr5573-0ubuntu1 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/maas/+bug/1652113/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1637835] Re: Zesty iso stops booting
Could you please post your libvirt config file for the domain? Specifically, I'd like to know if it has the apic feature enabled. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1637835 Title: Zesty iso stops booting To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/virt-manager/+bug/1637835/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1640320] Re: FTBFS in zesty
I don't see evidence of this error in the amd64 build log at https://launchpadlibrarian.net/298782129/buildlog_ubuntu-zesty-amd64 .location-service_3.0.0+16.10.20160912-0ubuntu2_BUILDING.txt.gz. However, the package does FTBFS due to this bug https://bugs.launchpad.net/ubuntu/+source/googletest/+bug/1644062 Looks like it may need some CMakeLists changes to be compatible with GoogleTest 1.8 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1640320 Title: FTBFS in zesty To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/location-service/+bug/1640320/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 1597450] Re: mod-gnutls FTBFS: test failure: apache2 seg fault
Hi Thomas, Good info, thanks. It's definitely a possibility, but I'm having a hard time explaining how that package could be responsible when it is synced with Sid as well and the configure strings in the build logs appear to be the same. I also tried a build from upstream source with the same result. Is there anything unusual about the way Debian builds gnutls vs Ubuntu? I can't find or think of anything relevant. On Sat, Jan 14, 2017 at 7:23 AM, Thomas Klute <1597...@bugs.launchpad.net> wrote: > Another package work looking at might be p11-kit. The last function call > above kernel and libc in the stack trace above is in libp11-kit, and so > are the memory issues I see using Valgrind on amd64. > > -- > You received this bug notification because you are subscribed to the bug > report. > https://bugs.launchpad.net/bugs/1597450 > > Title: > mod-gnutls FTBFS: test failure: apache2 seg fault > > Status in apache2 package in Ubuntu: > Confirmed > Status in mod-gnutls package in Ubuntu: > Confirmed > > Bug description: > mod-gnutls 0.7.5-2 in yakkety fails to build on all architectures > except amd64: > > https://launchpad.net/ubuntu/+source/mod-gnutls/0.7.5-2/ > > FAIL: test-24_pkcs11_cert.bash > == > > Generated temporary SoftHSM config mod_gnutls_test-BtVH7L.conf: > objectstore.backend = file > directories.tokendir = /«PKGBUILDDIR»/test/server/softhsm2.db > checking /usr/lib64/pkcs11/libsofthsm2.so ... > checking /usr/lib/softhsm/libsofthsm2.so ... > found! > TESTING: 24_pkcs11_cert > ./runtests failed at line 188! > FAILURE: 24_pkcs11_cert > httpd (no pid file) not running > > Apache error logs: > [Wed Jun 29 17:23:26.375898 2016] [core:notice] [pid 12681:tid > 4148214336] AH00060: seg fault or similar nasty error detected in the > parent process > FAIL test-24_pkcs11_cert.bash (exit status: 1) > > To manage notifications about this bug go to: > https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/ > 1597450/+subscriptions > -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1597450 Title: mod-gnutls FTBFS: test failure: apache2 seg fault To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1597450/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1597450] Re: mod-gnutls FTBFS: test failure: apache2 seg fault
Zesty 0.8.0-1 is the current FTBFS. I was able to progress the debugging a bit and something is scribbling on the stack. The problem I'm experiencing is gdb disables breakpoints in the shared lib I need to examine the stack canary address. Starting program: /usr/sbin/apache2 -X -f /home/bmorton/mod-gnutls-0.8.0/test/tests/24_pkcs11_cert/apache.conf -k start [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/i386-linux-gnu/libthread_db.so.1". AH00558: apache2: Could not reliably determine the server's fully qualified domain name, using 127.0.1.1. Set the 'ServerName' directive globally to suppress this message warning: Temporarily disabling breakpoints for unloaded shared library "/usr/lib/i386-linux-gnu/libp11-kit.so.0" *** stack smashing detected ***: /usr/sbin/apache2 terminated Program received signal SIGABRT, Aborted. 0xb7fd9cf9 in __kernel_vsyscall () (gdb) bt #0 0xb7fd9cf9 in __kernel_vsyscall () #1 0xb7d47050 in __libc_signal_restore_set (set=0xbfffe5cc) at ../sysdeps/unix/sysv/linux/nptl-signals.h:79 #2 __GI_raise (sig=6) at ../sysdeps/unix/sysv/linux/raise.c:55 #3 0xb7d48577 in __GI_abort () at abort.c:89 #4 0xb7d82f4f in __libc_message (do_abort=, fmt=) at ../sysdeps/posix/libc_fatal.c:175 #5 0xb7e14c78 in __GI___fortify_fail (msg=) at fortify_fail.c:37 #6 0xb7e14c18 in __stack_chk_fail () at stack_chk_fail.c:28 #7 0xb79c95e4 in __stack_chk_fail_local () from /usr/lib/i386-linux-gnu/libp11-kit.so.0 #8 0xb79a57e6 in proxy_C_GenerateKey (self=0xb6d3a9f0 >::get() const+28>, handle=2148314568, mechanism=0xb79c95e4 <_fini>, template=0xb7e14c05 <__stack_chk_fail+5>, count=3221220068, key=0x0) at p11-kit/proxy.c:1470 #9 0xb6d3a53d in Mutex::lock (this=0x800b9840) at MutexFactory.cpp:60 #10 0xb6d3a5cd in MutexLocker::MutexLocker (this=0xbfffea48, inMutex=0x800b9840) at MutexFactory.cpp:81 #11 0xb6d7f31f in Token::getTokenInfo (this=0x800cc198, info=0xbfffec20) at Token.cpp:410 #12 0xb6d0a384 in SoftHSM::C_GetTokenInfo (this=0x800c4310, slotID=1566642341, pInfo=0xbfffec20) at SoftHSM.cpp:601 #13 0xb6ceca45 in C_GetTokenInfo (slotID=1566642341, pInfo=0xbfffec20) at main.cpp:220 #14 0xb7b1367c in pkcs11_get_token_info (module=0x800bc470, slot_id=1566642341, info=0xbfffec20) at pkcs11_int.c:65 #15 0xb7b02f1f in _pkcs11_traverse_tokens (find_func=0xb7b0490f , input=0xbfffef04, info=0x800bd8c0, pin_info=0x800b4f04, flags=2) at pkcs11.c:1342 #16 0xb7b04eb8 in gnutls_pkcs11_obj_import_url (obj=0x800b4ec0, url=0xb7c39c48 "pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=230076e3dd6110a5;token=mod_gnutls-test;id=%d5%32%8e%a4%57%da%03%cf%84%2a%51%14%69%c9%9d%50%d2%8a%6b%12;object=certificate;type=cert", flags=1) at pkcs11.c:2068 #17 0xb7c4aa14 in mgs_load_files (pconf=, ptemp=, s=) at gnutls_config.c:332 #18 0xb7c4f7ea in mgs_hook_post_config (pconf=0xb7fcc018, plog=0xb7c8a018, ptemp=0xb7c86018, base_server=0xb7c8cf18) at gnutls_hooks.c:405 #19 0x80046370 in ap_run_post_config (pconf=0xb7fcc018, plog=0xb7c8a018, ptemp=0xb7c86018, s=0xb7c8cf18) at config.c:103 #20 0x80023dff in main (argc=, argv=) at main.c:771 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1597450 Title: mod-gnutls FTBFS: test failure: apache2 seg fault To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1597450/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1304760] Re: checkinstall fails to add files to dpkg conffiles
Bug has been fixed upstream http://bugtrack.izto.org/show_bug.cgi?id=35 ** Bug watch added: izto #35 http://bugtrack.izto.org/show_bug.cgi?id=35 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1304760 Title: checkinstall fails to add files to dpkg conffiles To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/checkinstall/+bug/1304760/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1597450] Re: mod-gnutls FTBFS: test failure: apache2 seg fault
Using latest deps in proposed Apache no longer segfaults on i386. FTBFS persists due to -Werror=format in the build and a few format/type issues that are easily fixed. Beyond that, test 24 still fails now with an error about the PKCS11 URL format which needs further investigation. 0.8.1 fixes the format string type issues for a clean build. Will request sync with upstream or I can submit the build fix as a patch. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1597450 Title: mod-gnutls FTBFS: test failure: apache2 seg fault To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1597450/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1597450] Re: mod-gnutls FTBFS: test failure: apache2 seg fault
Correction, it still segfaults on test 24 after the string format issues are fixed. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1597450 Title: mod-gnutls FTBFS: test failure: apache2 seg fault To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1597450/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1597450] Re: mod-gnutls FTBFS: test failure: apache2 seg fault
According to the Debian maintainer this does not occur in unstable on i386. Both apache2 and libgnutls30 are newer in unstable, so that could be related. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1597450 Title: mod-gnutls FTBFS: test failure: apache2 seg fault To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1597450/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1304760] Re: checkinstall fails to add files to dpkg conffiles
Hi Brian, Thanks for taking the time on this really old bug. Will this work? root@checkinstall-bug-trusty:~# apt-get source haproxy checkinstall root@checkinstall-bug-trusty:~# cd haproxy* root@checkinstall-bug-trusty:~/haproxy-1.5.14# mkdir -p etc/haproxy root@checkinstall-bug-trusty:~/haproxy-1.5.14# touch etc/haproxy/haproxy.cfg root@checkinstall-bug-trusty:~/haproxy-1.5.14# echo 'etc/haproxy.cfg' >> includes root@checkinstall-bug-trusty:~/haproxy-1.5.14# checkinstall -y --include=includes root@checkinstall-bug-trusty:~/haproxy-1.5.14# dpkg -e haproxy*.deb root@checkinstall-bug-trusty:~/haproxy-1.5.14# cat DEBIAN/conffiles | wc -l 0 after applying patched package of checkinstall dpkg -i ~/checkinstall_1.6.2-4ubuntu2_amd64.deb root@checkinstall-bug-trusty:~/haproxy-1.5.14# checkinstall -y --include=includes root@checkinstall-bug-trusty:~/haproxy-1.5.14# dpkg -e haproxy*.deb root@checkinstall-bug-trusty:~/haproxy-1.5.14# cat DEBIAN/conffiles | wc -l 1 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1304760 Title: checkinstall fails to add files to dpkg conffiles To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/checkinstall/+bug/1304760/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1304760] Re: checkinstall fails to add files to dpkg conffiles
root@checkinstall-bug-trusty:~# apt-get install checkinstall root@checkinstall-bug-trusty:~# apt-get source haproxy root@checkinstall-bug-trusty:~# cd haproxy* root@checkinstall-bug-trusty:~/haproxy-1.5.14# mkdir -p etc/haproxy root@checkinstall-bug-trusty:~/haproxy-1.5.14# touch etc/haproxy/haproxy.cfg root@checkinstall-bug-trusty:~/haproxy-1.5.14# echo 'etc/haproxy/haproxy.cfg' >> includes root@checkinstall-bug-trusty:~/haproxy-1.5.14# checkinstall -y --include=includes root@checkinstall-bug-trusty:~/haproxy-1.5.14# dpkg -e haproxy*.deb root@checkinstall-bug-trusty:~/haproxy-1.5.14# cat DEBIAN/conffiles | wc -l 0 after applying patched package of checkinstall, repeat the above steps root@checkinstall-bug-trusty:~/haproxy-1.5.14# cat DEBIAN/conffiles | wc -l 1 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1304760 Title: checkinstall fails to add files to dpkg conffiles To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/checkinstall/+bug/1304760/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1597450] Re: mod-gnutls FTBFS: test failure: apache2 seg fault
Tried building openssl 1.1 to match Debian sid, as well as latest apache2 and gnutls. All still segfault on i386 during this test. Out of ideas at this point. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1597450 Title: mod-gnutls FTBFS: test failure: apache2 seg fault To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1597450/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1668474] Re: AH00526 when using long ProxyPass worker name
Hi Robie, this fix is in Apache SVN trunk but isn't in upstream stable 2.4 release branch yet so all Ubuntu versions will be affected. In addition, no such patch exists in Debian source. https://anonscm.debian.org/cgit/pkg- apache/apache2.git/tree/modules/proxy/mod_proxy.h#n350 and https://anonscm.debian.org/cgit/pkg- apache/apache2.git/tree/debian/patches I think the best bet is to add it as a debian patch for Zesty and coordinate it with the Debian Apache maintainers until it lands in a stable upstream release. I adjusted the line number in the patch so it should apply cleanly against Zesty. ** Attachment added: "Zesty patch (2.4.25)" https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1668474/+attachment/4834216/+files/apache-zesty-patch.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1668474 Title: AH00526 when using long ProxyPass worker name To manage notifications about this bug go to: https://bugs.launchpad.net/apache2/+bug/1668474/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1668474] Re: AH00526 when using long ProxyPass worker name
** Also affects: apache2 (Debian) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1668474 Title: AH00526 when using long ProxyPass worker name To manage notifications about this bug go to: https://bugs.launchpad.net/apache2/+bug/1668474/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1598187] Re: mlsd/mlst fails on some clients
*** This bug is a duplicate of bug 1613737 *** https://bugs.launchpad.net/bugs/1613737 ** This bug has been marked a duplicate of bug 1613737 Proftpd - MLSD lines not properly terminated with CRLF -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1598187 Title: mlsd/mlst fails on some clients To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/proftpd-dfsg/+bug/1598187/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1325338] Re: proftpd service stopped by it's own
*** This bug is a duplicate of bug 1246245 *** https://bugs.launchpad.net/bugs/1246245 ** This bug has been marked a duplicate of bug 1246245 proftpd service fails to restart (including via logrotate) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1325338 Title: proftpd service stopped by it's own To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/proftpd-dfsg/+bug/1325338/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1398506] Re: logrotate's restart of proftpd fails to start
*** This bug is a duplicate of bug 1246245 *** https://bugs.launchpad.net/bugs/1246245 ** This bug has been marked a duplicate of bug 1246245 proftpd service fails to restart (including via logrotate) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1398506 Title: logrotate's restart of proftpd fails to start To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/proftpd-dfsg/+bug/1398506/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1630413] Re: segfault in server/mpm/event/event.c:process_socket
Hi Christophe, That is excellent. Could you please provide me with a test case that previously reproduced the crash? I'd like to try to boil it down to something simple. I will need to demonstrate that it can be reproduced easily and consistently to get an SRU approved. There aren't a lot of reporters of this issue, so it's pretty critical. Of course, if it doesn't get approved you're welcome to use my PPA until you upgrade to 16.04. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1630413 Title: segfault in server/mpm/event/event.c:process_socket To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1630413/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1668474] Re: AH00526 when using long ProxyPass worker name
Hi Robie, I do not know for certain. One user on the upstream bug mentions it can't be backported because of an API compat issue, but if there's one present I'm sure not seeing it. The define is entirely contained within that header file. The only thing I would think it could affect would be external modules built against mod_proxy.h root@apache2-mod-proxy-length-xenial:~/apache2-2.4.18# grep -R 'PROXY_WORKER_MAX_NAME_SIZE' * modules/proxy/mod_proxy.h:#define PROXY_WORKER_MAX_NAME_SIZE 96 modules/proxy/mod_proxy.h:#define PROXY_BALANCER_MAX_NAME_SIZE PROXY_WORKER_MAX_NAME_SIZE modules/proxy/mod_proxy.h:char name[PROXY_WORKER_MAX_NAME_SIZE]; modules/proxy/mod_proxy.h:char uds_path[PROXY_WORKER_MAX_NAME_SIZE]; /* path to worker's unix domain socket if applicable */ root@apache2-mod-proxy-length-xenial:~/apache2-2.4.18# grep -R 'PROXY_BALANCER_MAX_NAME_SIZE' * modules/proxy/mod_proxy.h:#define PROXY_BALANCER_MAX_NAME_SIZE PROXY_WORKER_MAX_NAME_SIZE modules/proxy/mod_proxy.h:char name[PROXY_BALANCER_MAX_NAME_SIZE]; modules/proxy/mod_proxy.h:char sname[PROXY_BALANCER_MAX_NAME_SIZE]; -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1668474 Title: AH00526 when using long ProxyPass worker name To manage notifications about this bug go to: https://bugs.launchpad.net/apache2/+bug/1668474/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1668474] Re: AH00526 when using long ProxyPass worker name
I don't think it is an actual incompatibility since the util function for copying those values takes into consideration the size of the dst buffer. As long as it is being lengthened, I think it's OK. It would be a problem if we were reducing it and src were larger than dst. #define PROXY_STRNCPY(dst, src) ap_proxy_strncpy((dst), (src), (sizeof(dst))) if (PROXY_STRNCPY(bshared->name, uri) != APR_SUCCESS) { return apr_psprintf(p, "balancer name (%s) too long", uri); } -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1668474 Title: AH00526 when using long ProxyPass worker name To manage notifications about this bug go to: https://bugs.launchpad.net/apache2/+bug/1668474/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1668474] Re: AH00526 when using long ProxyPass worker name
An excellent question/point. That should probably get hashed out on the upstream BZ first. The discussion about it was very minimal. I'll get on there and poke at that issue. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1668474 Title: AH00526 when using long ProxyPass worker name To manage notifications about this bug go to: https://bugs.launchpad.net/apache2/+bug/1668474/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1636617] [NEW] lxc set device root size fails silently when out of space
Public bug reported: On 16.04.1, use lxd init with default responses (zfs, loopback, 10G). Create container with lxc launch. Attempt to resize container root to 20G (larger than loopback file). lxc set device root size 20G reports no error, but the container still has a 1.1G root as shown by lxc exec df -h It would be ideal to have lxc throw an error of some kind when it does not have enough space to complete the operation. For documentation purposes, the fix is to grow the zfs.img file with truncate, turn on ZFS autoexpand, then perform a zpool online resize. After adding enough loopback device storage, the set command behaves identically but achieves the intended result. ** Affects: lxc (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1636617 Title: lxc set device root size fails silently when out of space To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1636617/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1636617] Re: lxc set device root size fails silently when out of space
Makes sense to me, thanks for looking into that! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1636617 Title: lxc set device root size fails silently when out of space To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1636617/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1462311] Re: proftpd mod_copy issue (CVE-2015-3306)
Attaching debdiff of upstream patch for trusty package. Precise is also vulnerable, so I will mark that as well while I work on that next. My primary test before/after patch: 220 ProFTPD 1.3.5rc3 Server (Debian) [:::10.129.53.2] USER bmorton 331 Password required for bmorton PASS *** 230 User bmorton logged in site cpfr /etc/passwd 350 File or directory exists, ready for destination name site cpto /tmp/passwd.copy 250 Copy successful 220 ProFTPD 1.3.5rc3 Server (Debian) [:::10.129.53.2] site cpfr /etc/passwd Connection closed by foreign host. ** Patch added: "Upstream patch applied for trusty" https://bugs.launchpad.net/ubuntu/+source/proftpd-dfsg/+bug/1462311/+attachment/4787121/+files/proftpd-dfsg_1.3.5~rc3-2.1ubuntu2.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1462311 Title: proftpd mod_copy issue (CVE-2015-3306) To manage notifications about this bug go to: https://bugs.launchpad.net/proftpd-dfsg/+bug/1462311/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs