*** This bug is a security vulnerability ***
Public security bug reported:
'xsel' crashes when the input length is within a specific range; adds
random characters to output. Demo:
ben@feynman:~$ perl -we'print "."x4000'|xsel -i;xsel -o|wc -c
4000
ben@feynman:~$ perl -we'print "."x4001'|xsel -i;x
Public bug reported:
w3m throws a series of GC/memory leak warnings when opening a badly-
formatted HTML file (an "img src=" tag containing a 'sparkline' image
that's ~700k in size; I received this as an email attachment.) The file
is here:
http://okopnik.com/misc/email.html
The warnings look li
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/994852
Title:
GC/memory leak warnings when parsing large "img src" tag
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+
> Something like 'apropos /bin/bash' doesn't do anything useful anyway.
Right, but 'cd /bin; apropos *' does - and still has exactly the same
problem as I originally reported. As to 'whatis', I had tested it before
writing up this bug; it produces a totally different set of results,
including thro
Yep, what I sent was a demo of the problem. As to why you'd do this...
um, newbie Linux users wanting to see what all the standard utlities do,
for example? That makes for a rather useful functional reference. Given
that part of what I do is teach such newbies, I personally would find it
nice to be
** Package changed: ubuntu => man-db (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/927028
Title:
'apropos' maxes out CPU when run with '/bin/*' as argument
To manage notifications about th
Public bug reported:
When 'apropos' is executed with an argument containing a list of files
in a directory (e.g., '/bin/*'), it maxes out the CPU for a good long
while (~40 seconds for /bin/*, about 9.5 minutes for /usr/bin/[a-z]*).
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/873284
Title:
Chrome shows errors after being run with "sudo"
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ch
Public bug reported:
After being run with "sudo", Chrome starts to pop up a pair of boxes
that say "Your preferences cannot be read" (and, obviously, fails to
read the preferences.) The problem is that two of the files in the
~user/.config directory are now owned by root and have 0700 as their
per
That's what's available in Ubuntu 9.10 ('apt-get install mc' tells me
that I've got the latest version.) I've downloaded and compiled the
latest stable, and you're right - it's gone. The standard version in
Ubuntu should be handled, though.
Thanks for your help!
--
Incorrect expansion of '~' on
Public bug reported:
Binary package hint: mc
$ mc -V
GNU Midnight Commander 4.6.2
Virtual File System: tarfs, extfs, cpiofs, ftpfs, fish
With builtin Editor
Using system-installed S-Lang library with terminfo database
With subshell support as default
With support for background operations
With mo
Public bug reported:
Binary package hint: grandr
Source package: grandr
Ubuntu release: 9.10
Package version: 0.1+git20080326-1ubuntu2
When the 'Enable hot keys' box is checked in the 'Hot keys' tab of
'grandr', holding down either of the shift keys prevents any input into
the console. In gnome-
Hi:
The actual fix requires changing the regex that parses the output of
'unzip -qq -v' (which has changed), as well as the code that uses the
results of that regex. Here's the diff:
41,43c41,43
< # 2891 Defl:N 1435 50% 03-30-00 21:19 50cbaaf8 ./edit.html
< # (size) (method) (zippeds
13 matches
Mail list logo