Maybe this is the fix:
x86/speculation/l1tf: fix overflow on l1tf_pfn_limit() on 32bit
https://lkml.org/lkml/2018/8/20/222
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to util-linux in Ubuntu.
https://bugs.launchpad.net/bugs/1
On Xenial, update to "linux-image-4.4.0-135-generic 4.4.0-135.161" did
not fix the problem, but I noticed a message, that might be related to
the issue:
[3.083083] Truncating oversized swap area, only using 0k out of
261116k
--
You received this bug notification because you are a member of U
This is the failing "swapon" sequence from updated Xenial i386 on
vmware:
3915 open("/dev/sda2", O_RDONLY|O_LARGEFILE) = 3
3915 uname({sysname="Linux", nodename="v3ls1717", ...}) = 0
3915 ioctl(3, BLKGETSIZE64, [535822336]) = 0
3915 read(3,
"\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
Just as a side note:
1) apt-key via debootstrap is currently broken on Bionic anyway (gpgv1
to gpgv2 side effects probably), see
https://bugs.launchpad.net/ubuntu/+source/debootstrap/+bug/1767319
2) apt-key seems to be deprecated and should not be used any more on
newer systems, so maybe the bug
** Changed in: apt (Ubuntu)
Status: Incomplete => New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1742695
Title:
apt-get update silently fails fetching security upda
See also
https://unix.stackexchange.com/questions/175146/apt-get-update-exit-status
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1742695
Title:
apt-get update silently fails
Here the output:
# apt-get update
Err:3 http://mirror.[domain]/ubuntu xenial-security InRelease
Unable to connect to mirror.[domain]:80:
Reading package lists... Done
...
W: Failed to fetch
http://mirror.[domain]/ubuntu/dists/xenial-security/InRelease Unable to
connect to mirror.[domain]
Public bug reported:
On Ubuntu Xenial, apt-get fails silently when security update server
cannot be reached. This state could be detected by scanning the apt-get
output afterwards. But manually adding workarounds to each apt-get
invocation in production automation is prone to error, thus leaving
m
I'm not so deep in LXC to know how the design/specification is done for
that. Discussion of "features" might therefore suite the lxc-users
mailing list better.
The other thing is, if Ubuntu would treat that part of new behaviour of
LXC affecting some users as "regression" and hence might act on th
Does https://lists.linuxcontainers.org/pipermail/lxc-
users/2015-September/010131.html point to the same problem?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1476662
Title:
Public bug reported:
It seems that if-up.d is activated before any temporary directory is
available. On affected setup that caused a bash here-tag to fail, thus
security settings were not applied to the interface leaving it open to
attacks.
Documentation seems to be unclear, if any script should
Seems to be similar to [1], although cause in [1] to end up at the very
same position might due to another problem also in transmission.
[1] https://bugs.launchpad.net/ubuntu/+source/transmission/+bug/1304004
** Also affects: curl (Ubuntu)
Importance: Undecided
Status: New
** Also affe
Just noticed, that [1] is most likely a duplicate of this.
[1] https://bugs.launchpad.net/ubuntu/+source/audit/+bug/1317188
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to audit in Ubuntu.
https://bugs.launchpad.net/bugs/1158
13 matches
Mail list logo