Public bug reported:
I've hit this panic a few times today on focal, 5.4.0-84-generic with
wireguard-dkms 1.0.20201112-1~20.04.1
__stack_chk_fail
__icmp_send
wg_xmit
(see panic.jpg for the rest of it)
It looks a lot like https://www.spinics.net/lists/netdev/msg723248.html fixed
in
https://git
Public bug reported:
10_linux was changed to exit early if / is zfs. That doesn't work if /boot is a
ext4 filesystem which should be detected by the rest of 10_linux.
The result is that grub doesn't create any entries for any kernels and the
system isn't bootable, manual intervention is required
I guess that's a question for the Ubuntu maintainer :)
Matt
> On Mon 8/8/2016, at 9:31 pm, Madper Xie wrote:
>
> @Matt,
> Sorry for the late.
> I already tested, the patch in comment #10 fixes the issue. Do you plan to
> backport the patch into 14.04?
>
> --
> You received this bug notificat
Does this attached patch work for you? It fixes when I test here.
Combination of
https://secure.ucc.asn.au/hg/dropbear/rev/c919dbb39395
https://secure.ucc.asn.au/hg/dropbear/rev/68723d66dec6
https://secure.ucc.asn.au/hg/dropbear/rev/88043f9d40bd
** Patch added: "dropbear-2013.60-iovlimit.diff"
I wonder if https://secure.ucc.asn.au/hg/dropbear/rev/c4f138dae2fd might
help, if the problem is that write() is returning EAGAIN.
If you apply the patch
https://secure.ucc.asn.au/hg/dropbear/rev/3873b39c4de6 the auth.log
output should show why write() is failing.
--
You received this bug notifi
** Description changed:
- OpenSSH 6.8 to 7.1 has a regression that breaks connections from clients
- that use SSH first_kex_follows feature. This affects connections from
- the Dropbear SSH client (dbclient), they fail with "bad hostkey
- signature" or similar. It may affect ssh.com clients too.
+
Public bug reported:
OpenSSH 6.8 to 7.1 has a regression that breaks connections from clients
that use SSH first_kex_follows feature. This affects connections from
the Dropbear SSH client (dbclient), they fail with "bad hostkey
signature" or similar. It may affect ssh.com clients too.
This has be
** Patch added: "smokeping_2.6.8-2+deb7u1.debdiff"
https://bugs.launchpad.net/ubuntu/+source/smokeping/+bug/1525927/+attachment/4534547/+files/smokeping_2.6.8-2%2Bdeb7u1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https
** Information type changed from Private Security to Public Security
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1525927
Title:
CVE-201
I can't immediately see how that patch would fix it (I wrote it). When
dropbear fails does it log anything in auth.log?
Cheers,
Matt
On 21 September 2015 4:03:24 pm AWST, Madper Xie
wrote:
>Public bug reported:
>
>I'm connecting via ssh to our platform running dropbear. If I cat
>/var/log/syslo
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1443945
Title:
Security issues fixed in chrony 1.31.1
To manage notifications about this bu
They're enabled by default in 2015.67
Cheers,
Matt
On 7 February 2015 7:03:43 pm AWST, Richard Hansen <1409...@bugs.launchpad.net>
wrote:
>** Description changed:
>
>+ [Impact]
>+
> Since version 2013.56, dropbear has supported the hmac-sha2-256 and
> hmac-sha2-512 MAC algorithms, but they ar
Public bug reported:
In 1.17-3 there was:
* Define -DLTM_DESC to enable the libtommath functions
(Thanks Cezary and Pali)
(Similarly for GMP_DESC). But it isn't defined in tomcrypt_custom.h so
programs won't find it.
This will break the next released version of Dropbear.
** Affects: libt
A workaround for this is to add extra "-p " arguments
to DROPBEAR_EXTRA_ARGS in /etc/defaults/dropbear. I'm not
sure if it'd be worth adding the extra complexity for
parsing DROPBEAR_PORT.
Matt
Dropbear developer
--
You received this bug notification because you are a member of Ubuntu
Bugs, whic
Debian bug 409938 is a different problem, Subject Alternative isn't SNI.
** Changed in: wget (Debian)
Status: Fix Released => Unknown
** Changed in: wget (Debian)
Remote watch: Debian Bug tracker #409938 => GNU Savannah Bug Tracker #20421
--
You received this bug notification because yo
Sounds like the bug fixed in 2011.54.
Support for ipv6 TCP forward numeric addresses isn't there yet (#3) but
I don't think that's what this bug is about.
** Bug watch added: Debian Bug tracker #636696
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=636696
** Also affects: dropbear (Debian)
** Bug watch added: Red Hat Bugzilla #590202
https://bugzilla.redhat.com/show_bug.cgi?id=590202
** Also affects: fedora via
https://bugzilla.redhat.com/show_bug.cgi?id=590202
Importance: Unknown
Status: Unknown
--
Wireless connection frequently drops [deauthenticating by local c
Seems like Ubuntu should ship that RT2870STA.dat file, possibly with the
driver patched to find it in a more conventional path?
11n works fine with it copied in here (Planex GW-USMicroN, updated
Karmic, i386).
--
ralink rt2870 usb wlan driver doesn't support 802.11n
https://bugs.launchpad.net/bu
Dropbear should handle IPv6 fine, and the Debian stable 0.51-1 package
works fine (dbclient and dropbear, connecting to IPv6 hosts on the local
network by IP). What does "netstat -antp|grep dropbear" as root say?
Matt
Dropbear Developer
--
dropbear does not handle IPv6
https://bugs.launchpad.net
I can't get pgup/pgdown to work either here (US/Australian keyboard of
the same type).
xev shows nothing happening when I press Fn by itself, and Fn-Up looks
the same as Up. Any suggestions on what else to look at to figure what's
going on?
I suppose there's the possibility that under macos some
Sorry, I meant to type 2.6.27-11-generic in Intrepid updates
--
wishlist - ship vmlinux in a -dbg package for oprofile use
https://bugs.launchpad.net/bugs/56402
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
This seems to have regressed in Intrepid. Somewhere pointed at
http://ddebs.ubuntu.com/pool/main/l/linux/ though that seems to be yet-
to-be-released kernels only (2.6.28- debug vs 2.6.26- in Intrepid
updates).
--
wishlist - ship vmlinux in a -dbg package for oprofile use
https://bugs.launchpad.n
I'm seeing this too on an Asus M2N-MX SE board (with latest BIOS).
Looks like it was fixed upstream in
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=ef756b3e56c68a4d76d9d7b9a73fa8f4f739180f
--
forcedeth changes MAC address after suspend/resume
https://bugs.launc
*** This bug is a duplicate of bug 82108 ***
https://bugs.launchpad.net/bugs/82108
I'm seeing this too on an Asus M2N-MX SE board (with latest BIOS).
Looks like it was fixed upstream in
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ef756b3e56c68a4d76d9d7b9a73fa8f
24 matches
Mail list logo