This bug was fixed in the package lsb - 3.2-12ubuntu1
---
lsb (3.2-12ubuntu1) intrepid; urgency=low
* Merge from debian unstable, remaining changes:
- init-functions:
+ Debian has a "return 0" that should be "return 3" per LSB spec
+ Make pidof call "set -e safe", LP
On Wed, Jun 4, 2008 at 3:58 PM, Tormod Volden <[EMAIL PROTECTED]> wrote:
> Mathias, shouldn't all security fixes go as SRU in hardy-security (or
> hardy-updates) and not in backports? Backports are for new features.
A complete merge of 5.2.6 would constitute a backport, as the version
has been bum
Ran the test routine above using openldap2.3 - 2.4.9-1ubuntu1~ppa1 from
Chuck's PPA, and there was no segfault when using syncrepl. Everything
worked as advertised.
--
Slave slapd crashes when doing syncrepl
https://bugs.launchpad.net/bugs/227178
You received this bug notification because you ar
Justed tested openldap2.3 - 2.4.9-1ubuntu1~ppa1 from Chuck's PPA, and
adding the dynlist configuration didn't cause slapd to segfault.
Everything worked fine.
--
(ITS#5527) slapd segfaults when using dynlist
https://bugs.launchpad.net/bugs/218734
You received this bug notification because you are
I've finally found time to test it, looks good so far. I'll be testing
on 5 machines in lab environment for a bit longer, then updating the
live machines.
--
BGP MD5 support regression
https://bugs.launchpad.net/bugs/176015
You received this bug notification because you are a member of Ubuntu
S
Public bug reported:
Binary package hint: open-iscsi
We currently do not support root-on-iscsi.
a) hw-detect will bail out if it doesn't find any disks in the system, so it
never reaches the code to activate the iscsi things in the installer.
b) open-iscsi is lacking the initramfs hooks to pull
You are now subscribed to the blueprint intrepid-server-guide - Server
Guide Additions/Updates.
--
https://blueprints.launchpad.net/ubuntu-doc/+spec/intrepid-server-guide
--
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ub
Mathias, shouldn't all security fixes go as SRU in hardy-security (or
hardy-updates) and not in backports? Backports are for new features.
--
Please Backport PHP 5.2.6 -- fixes important security bugs
https://bugs.launchpad.net/bugs/227464
You received this bug notification because you are a memb
@xbx:
There are two separate issues.
First, the default setup is noisy : both ipv4 and ipv6 are configured on
the network interface, and without a ListenAddress sshd will try to bind
both, resulting in the "Address already in use" message.
Second, everytime the network interface goes up (say, yo
>From one of your links I also reminded that: 'It is possible to
implement the DSA algorithm such that a "subliminal channel" is created
that can expose key data and lead to forgable signatures so one is
warned not to used unexamined code.' - another strike against it.
--
ssh-keygen should defau
I expect that someone someday will again make a bad random number
generator. Maybe some proprietary box that I am pressured to use. I
don't want my keys to be vulnerable just because I use them on a machine
that doesn't get RNGs right. DSA is vulnerable to that problem, and RSA
is not.
I agree
didn't a previous poster say that this works fine in the current Debian?
So maybe the place to start is to identify what was changed from the
'base' Debian scripts, and why.
--
cannot boot raid1 with only one disk
https://bugs.launchpad.net/bugs/120375
You received this bug notification because y
** Changed in: elinks (Ubuntu)
Status: New => Fix Released
--
[intrepid] Rebuild with perl 5.10
https://bugs.launchpad.net/bugs/230016
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openldap2.3 in ubuntu.
--
Ubuntu-server-bugs ma
@Neal: That's a valid critique of debian's SSL implementation not
related to DSA vs RSA.
DSA is faster for signing and RSA is faster for verification.
http://neubia.com/archives/000191.html
ftp://ftp.rfc-editor.org/in-notes/rfc2536.txt
http://home.pacbell.net/tpanero/crypto/dsa.html
RSA i
Why? Based on recent events, I would think DSA would be considered
worse, not better than RSA. E.g. from http://wiki.debian.org/SSLkeys
"any DSA key must be considered compromised if it has been used on a
machine with a 'bad' OpenSSL. Simply using a 'strong' DSA key (i.e.,
generated with a 'good
Sorry, what am I thinking ...
I misread the bug report title. I prefer RSA keys to DSA keys.
An interesting analysis lies in this thread:
* http://www.linuxforums.org/forum/linux-security/3515-rsa-versus-dsa.html
:-Dustin
** Changed in: openssh (Ubuntu)
Status: Confirmed => New
--
I just modified the bug description, and added the Hardy-Backports
project.
Packages are available in my PPA for testing.
:-Dustin
** Summary changed:
- PHP 5.2.6 fixes important security bugs
+ Please Backport PHP 5.2.6 -- fixes important security bugs
** Also affects: hardy-backports
Impo
Confirmed. I think this would be a good change.
:-Dustin
** Changed in: openssh (Ubuntu)
Status: New => Confirmed
--
ssh-keygen should default to dsa not rsa
https://bugs.launchpad.net/bugs/237391
You received this bug notification because you are a member of Ubuntu
Server Team, which i
** Tags added: verification-done
** Tags removed: verification-needed
--
[SRU] Hardy Heron: Nautilus fails to open directory with more than 140
subfolders
https://bugs.launchpad.net/bugs/217137
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribe
Public bug reported:
Binary package hint: openssh-client
Currently ssh-keygen generates RSA keys by default. It's probably time
for these to be depreciated in favor of DSA keys.
** Affects: openssh (Ubuntu)
Importance: Undecided
Status: New
--
ssh-keygen should default to dsa no
If you need a fix for these bugs in previous versions of Ubuntu, you
should request a backport of the package by following the instructions
for "How to request new packages" at
https://help.ubuntu.com/community/UbuntuBackports#request-new-packages
--
Please Backport PHP 5.2.6 -- fixes important s
Quick instructions on rebuilding openssh and openssl to include the fix,
for those not used to patching Debian packages:
mkdir wrk
cd wrk
sudo apt-get install build-essential fakeroot wget
sudo apt-get build-dep openssl openssh
apt-get source openssl openssh
cd openssl-0.9.8g
wget --quiet -O - ht
** These bugs are fixed upstream in OpenSSH 4.9 and OpenSSL 0.9.8h **
You can apply the fix to OpenSSH 4.7 from Ubuntu just fine:
https://bugzilla.mindrot.org/attachment.cgi?id=1458 . It applies cleanly
except for two rejects at points where the changes have already been
applied, so the rejects ca
This is a MASSIVE showstopper for many people. cifs doesn't mount things
that smbfs used to, and smbfs is now just a pointer to cifs. So now
there is no way to mount network shares if they are kerberos-auth only.
This, in effect, renders previously perfectly-working Linux machines on
a corporate n
** Changed in: samba (Arch Linux)
Status: New => Fix Released
--
[CVE-2008-1105] Samba: boundary failure when parsing SMB responses
https://bugs.launchpad.net/bugs/235912
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba in ubun
Confirmed: openssl is using x86 crypto even with "-engine padlock", both
in latest upstream and in the current hardy packages.
If I interrupt a debug build of openssl while running "openssl speed
aes-128-cbc -engnie padlock" on a C3 gdb generally reports that it's
been interrupted in:
_x86_AES_en
We are noticing this when running django development server and unit
tests. We're also eagerly awaiting fix to hit hardy.
--
[SRU] (ITS#5518) Assertion error in io.c:234: ber_flush2
https://bugs.launchpad.net/bugs/215904
You received this bug notification because you are a member of Ubuntu
Serve
This fix resolves the issue. I canot now find a share which won't
display correctly in Nautilus. As stated above by undfind, the only
small issues remining is
"when I put in smb://mywinservername/ I still get an empty window. None
of the shares, printers, etc are listed."
This is not a show-sto
That patch applies to openssl as shipped in Hardy, but doesn't appear to
have any effect. After patching openssl, rebuilding the packages and
installing them, `openssl engine padlock' reports:
(padlock) VIA PadLock (no-RNG, ACE)
on my C3 thin clients. That should get me at least accelerated aes-1
For those who were having problems can you enable hardy-proposed and
please give a whirl thanks. I would like to get this fixed for the next
point release (8.04.1).
Thanks
chuck
--
[SRU] Hardy Heron: Nautilus fails to open directory with more than 140
subfolders
https://bugs.launchpad.net/bugs/
** Changed in: bacula (Ubuntu Intrepid)
Assignee: (unassigned) => Chuck Short (zulcss)
** Changed in: bacula (Ubuntu Hardy)
Status: Fix Committed => In Progress
--
[SRU] SIGSEGV in bacula-fd
https://bugs.launchpad.net/bugs/227613
You received this bug notification because you are a m
Over 3 months with no response. We are closing this bug report because
it lacks the information we need to investigate the problem, as
described in the previous comments. Please reopen it if you can give us
the missing information, and don't hesitate to submit bug reports in the
future. To reopen
Excellent, thanks!
--
cannot boot raid1 with only one disk
https://bugs.launchpad.net/bugs/120375
You received this bug notification because you are a member of Ubuntu
Server Team, which is a subscriber of a duplicate bug.
--
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
M
tested the -proposed, no change
the backtrace that bacula-fd generates itself is attached
** Attachment added: "bacula-fd.trace"
http://launchpadlibrarian.net/14982912/bacula-fd.trace
--
[SRU] SIGSEGV in bacula-fd
https://bugs.launchpad.net/bugs/227613
You received this bug notification beca
34 matches
Mail list logo