Maybe this is the fix:
x86/speculation/l1tf: fix overflow on l1tf_pfn_limit() on 32bit
https://lkml.org/lkml/2018/8/20/222
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788321
Title:
swapon failed:
On Xenial, update to "linux-image-4.4.0-135-generic 4.4.0-135.161" did
not fix the problem, but I noticed a message, that might be related to
the issue:
[3.083083] Truncating oversized swap area, only using 0k out of
261116k
--
You received this bug notification because you are a member of U
This is the failing "swapon" sequence from updated Xenial i386 on
vmware:
3915 open("/dev/sda2", O_RDONLY|O_LARGEFILE) = 3
3915 uname({sysname="Linux", nodename="v3ls1717", ...}) = 0
3915 ioctl(3, BLKGETSIZE64, [535822336]) = 0
3915 read(3,
"\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
Just as a side note:
1) apt-key via debootstrap is currently broken on Bionic anyway (gpgv1
to gpgv2 side effects probably), see
https://bugs.launchpad.net/ubuntu/+source/debootstrap/+bug/1767319
2) apt-key seems to be deprecated and should not be used any more on
newer systems, so maybe the bug
Public bug reported:
"debootstrap bionic" run on Ubuntu Xenial will create a bootstrap
installation missing any gnupg (not gpgv) tools. Thus continuing
installation from the bootstrapped installation using own debian package
archives will fail, as that would require adding of public keys for the
p
Preloading the attached shared library solves the hang on non-udev
initrds. Compile with
gcc -shared -fPIC -o no-udev.so UdevDisableLib.c -ldl
Difference seems to be that /dev/mapper/ entries are created a s block
devices, not symlinks any more. But that does not hurt in my usecase
(kexec will ki
** Changed in: apt (Ubuntu)
Status: Incomplete => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1742695
Title:
apt-get update silently fails fetching security updates
To manage notificat
See also
https://unix.stackexchange.com/questions/175146/apt-get-update-exit-status
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1742695
Title:
apt-get update silently fails fetching security updat
Here the output:
# apt-get update
Err:3 http://mirror.[domain]/ubuntu xenial-security InRelease
Unable to connect to mirror.[domain]:80:
Reading package lists... Done
...
W: Failed to fetch
http://mirror.[domain]/ubuntu/dists/xenial-security/InRelease Unable to
connect to mirror.[domain]
Public bug reported:
On Ubuntu Xenial, apt-get fails silently when security update server
cannot be reached. This state could be detected by scanning the apt-get
output afterwards. But manually adding workarounds to each apt-get
invocation in production automation is prone to error, thus leaving
m
Public bug reported:
When attempting to create a new host configuration in Zabbix, an error is
reported:
"Incorrect arguments passed to function."
On Ubuntu Xenial, zabbix-frontend-php /usr/share/zabbix/js/prototype.js
is a symlink to the generic Ubuntu javascripts:
/usr/share/zabbix/js/prototy
Bug seems to be fixed in newer version of git, see chat
http://colabti.org/irclogger/irclogger_log/git?date=2017-03-07
Current trunk reports:
"fatal: FETCH_HEAD - not something we can merge"
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to U
Public bug reported:
Following steps cause a segfault on 32/64bit Ubuntu Xenial:
mkdir x y
git init x
git init y
cd x
git remote add y ../y
git fetch y
git merge -s ours --no-commit FETCH_HEAD
$ lsb_release -rd
Description:Ubuntu 16.04.2 LTS
Release:16.04
$ apt-cache policy git
git:
Package now available in yakkety:
http://packages.ubuntu.com/yakkety/logdata-anomaly-miner
** Changed in: ubuntu
Status: In Progress => Fix Released
** Package changed: ubuntu => logdata-anomaly-miner (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs
See also https://irclogs.ubuntu.com/2016/08/03/%23ubuntu-motu.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1542258
Title:
[needs-packaging] logdata-anomaly-miner -- lightweight tool for log
Package installed on our package mirror, fixes the bug and allows to
mirror Xenial from here on. (Mirror already filled, working).
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1565585
Title:
Old de
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1508737
Title:
unix domain socket bind causes kernel audit NULL pointer deference
To manage
Rediscovered also on our systems, then found this bug report.
Reproducer for Ubuntu Trusty LTS:
auditctl -a always,exit -F arch=b64 -S bind
#!/usr/bin/python2 -BEsSt
import socket
testSocket=socket.socket(socket.AF_UNIX, socket.SOCK_STREAM)
testSocket.bind('sock')
# dmesg -c
[ 145.499064] BUG:
** Changed in: ubuntu
Status: New => In Progress
** Changed in: ubuntu
Assignee: (unassigned) => Roman Fiedler (roman-fiedler)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1542258
* Package available at: https://launchpad.net/~roman-
fiedler/+archive/ubuntu/ppa/+packages
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1542258
Title:
[needs-packaging] logdata-anomaly-miner
* Debian ITP: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813096
* Debian Mentoring:
https://lists.debian.org/debian-mentors/2016/02/msg00021.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1
Public bug reported:
Package name: logdata-anomaly-miner
Version: 0.0
Upstream Author: Roman Fiedler
URL: FIXME (see below)
Sources URL: Mentoring: Best location? GIT preferred.
License: GPLv3
Programming Lang: Python
Description: logdata-anomaly-miner is a GUI-less server component
to analyze
Having same problem on Ubuntu Trusty. Executing the following within
unpacked kernel directory and before starting build seems to fix it:
cat < arch/x86/boot/install.sh
#!/bin/sh
cp -a -- "\$2" "\$4/vmlinuz-\$1"
EOF
--
You received this bug notification because you are a member of Ubuntu
Bugs, w
I'm not so deep in LXC to know how the design/specification is done for
that. Discussion of "features" might therefore suite the lxc-users
mailing list better.
The other thing is, if Ubuntu would treat that part of new behaviour of
LXC affecting some users as "regression" and hence might act on th
Does https://lists.linuxcontainers.org/pipermail/lxc-
users/2015-September/010131.html point to the same problem?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1476662
Title:
lxc-start symlink vuln
*** This bug is a duplicate of bug 1450442 ***
https://bugs.launchpad.net/bugs/1450442
Sorry, was too fast. The patch works with some audit rulesets, but not
all.
And here is also the new OOPS for amd64:
[ 424.803949] BUG: unable to handle kernel NULL pointer dereference at
003
*** This bug is a duplicate of bug 1450442 ***
https://bugs.launchpad.net/bugs/1450442
The fix from 3.13.0-52.85 changes behavior (now SSH login working also
after first OOPS) but fix might be incomplete or there are two very
similar bugs.
New trace when using proposed:
[ 31.077681] BUG: u
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1451360 is marked
as duplicate. The fix from here changes the behaviour of the duplicate
(SSH login now working again, but still kernel OOPS).
So if both have common cause (very likely), then 3.13.0-52.85 is only
incomplete fix.
--
You receive
Isn't apport for reporting of application crashes?
Apart from that sudo fails also to get privileges to access logs.
Network, X and many other command line utilities also failing, so I'm
not sure how apport could succeed.
Also syslog is crashed, the dmesg log was created manually since dmesg
and
Public bug reported:
After update, desktop and production machines, both using i386 and amd64
kernels fail.
The crash may only occur after loading of syscall audit rules, hence
boot up to initrd is still possible.
Login is still possible but many integral functions fail, e.g. sending
signals to
Public bug reported:
It seems that if-up.d is activated before any temporary directory is
available. On affected setup that caused a bash here-tag to fail, thus
security settings were not applied to the interface leaving it open to
attacks.
Documentation seems to be unclear, if any script should
Public bug reported:
When ulogd2 has problems reopening the pcap file it will crash
immediately or some seconds later - most likely due to first attempt to
flush packets to dump file after reopen (file NULL-ptr?).
Reproduce:
chown root.root /var/log/ulog/ulogd.pcap
chmod 0644 /var/log/ulog/ulogd
I have no simple reproducer, the only one really working here is:
* Setup Ubuntu Trusty machine (mine is a i386 guest, but amd64 should have same
bug)
* Install Zabbix Monitoring system
* "Configuration->Hosts": Create host "test"
* "Configuration->Hosts:" Click on "Applications" in host "test",
Seems to be similar to [1], although cause in [1] to end up at the very
same position might due to another problem also in transmission.
[1] https://bugs.launchpad.net/ubuntu/+source/transmission/+bug/1304004
** Also affects: curl (Ubuntu)
Importance: Undecided
Status: New
** Also affe
Public bug reported:
Bug occurs when interacting with some but not all SSL-webservers, so it
seems to be triggered by the remote side, crashing a zabbix monitoring
system when connecting to a problematic Apache 2.4 server in my case.
Program received signal SIGSEGV, Segmentation fault.
gnutls_x50
I might have observed the same bug, affecting libgnutls.so.26 or
libcurl-gnutls.so.4 or the combination of both, and seems to be
triggered by the remote side, crashing a zabbix monitoring system when
connecting to a single server.
Program received signal SIGSEGV, Segmentation fault.
gnutls_x509_cr
Just noticed, that [1] is most likely a duplicate of this.
[1] https://bugs.launchpad.net/ubuntu/+source/audit/+bug/1317188
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1158500
Title:
auditd fails
Public bug reported:
There is a known issue in strace, where attaching to children fails due
to races in strace code. See [1] for description of the bug on strace
developer mailing list. A patch [2] was created 2013-07-08 to fix the
problem. The problem might also occur when debugging real-world
a
Public bug reported:
It seems, that auditctl as packaged with Ubuntu Precise 1204 uses an old
syscall API control to add rules:
#define AUDIT_ADD 1003 /* Add syscall rule -- deprecated */
The new value should be
#define AUDIT_ADD_RULE 1011 /* Add syscall filtering rule */
The value is deprecat
** Attachment added: "ProcessesBeforeShutdown"
https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/1316991/+attachment/4107076/+files/ProcessesBeforeShutdown
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpa
Public bug reported:
This issue occurs with Ubuntu Trusty and xdm installed. The system
reacts on [Ctrl]-[Alt]-[Del], which triggers
exec shutdown -h now "Control-Alt-Delete pressed"
without any additional checks via /etc/init/control-alt-delete.conf. An
open SSH connection will then also report
** Attachment added: "ProcessesDuringShutdown-WithoutPlymouthDisabler"
https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/1316991/+attachment/4107077/+files/ProcessesDuringShutdown-WithoutPlymouthDisabler
--
You received this bug notification because you are a member of Ubuntu
Bugs, whic
** Attachment added: "ProcessesDuringShutdown-WithPlymouthDisablerInstalled"
https://bugs.launchpad.net/ubuntu/+source/plymouth/+bug/1316991/+attachment/4107078/+files/ProcessesDuringShutdown-WithPlymouthDisablerInstalled
--
You received this bug notification because you are a member of Ubunt
Workaround: make git clone single-threaded (and slower):
$ export GIT_HTTP_MAX_REQUESTS=1
See https://www.kernel.org/pub/software/scm/git/docs/git-config.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net
Public bug reported:
# lsb_release -rd
Description:Ubuntu 12.04.4 LTS
Release:12.04
# apt-cache policy git
git:
Installed: 1:1.7.9.5-1
Candidate: 1:1.7.9.5-1
Version table:
*** 1:1.7.9.5-1 0
500 http://ubuntu-proxy-ehealth.d03.arc.local/ubuntu/ precise/main
amd64 Packa
Public bug reported:
After accept socket options are applied to the listening socket again,
but not to the accepted connection's socket. This can be seen when e.g.
requesting TCP-keepalives to be sent:
When connecting with socat to a non-keepalive listener everything works as
expected:
socat T
Public bug reported:
Happening on Precise with
ii libjsch-java 0.1.42-2fakesync1pure
Java implementation of the SSH2 protocol
The issue is already fixed in jsch, see http://www.jcraft.com/jsch/ChangeLog
Changes since version 0.1.49:
- bugfix: "verify: false" er
Public bug reported:
After upgrading the kernel from 32 to 64 bit WITHOUT upgrading the
system to 64 bit, everything worked fine except that the ulogd
(1.24-3ubuntu1) messages written to syslogemu were complete garbage,
e.g.
Jan 1 00:00:00 localhost 0 0 20 0 1 < IN= [unprintable bytes]
R OUT= [
OK, seems that apport-collect needs network access.
# apport-collect 1026478
ERROR: connecting to Launchpad failed: [Errno 110] Connection timed out
I'll look at it with the man-pages in hand when there is a little more
time.
--
You received this bug notification because you are a member of Ubu
Due to note 3, I assume, that note 4 is irrelevant and just a byproduct
of marking the issue duplicate/invalid.
According to note 3 and if applicable, please add reference to the
kernel bug report after creation, so that I can start tracking that one
instead.
--
You received this bug notificatio
I tried the "noserverino" workaround now and it worked.
Since without knowing that workaround, severe dataloss or more unlikely
malicious data hiding could occur on those machines, I would mandate to
make that option more prominent, e.g. to force mounts to have one of
"noserverino" or "serverino",
Public bug reported:
The listing (dirread) of a CIFS-mounted share does not contain one file, but
which is really available on the share. When accessing the file directly (stat
or open call), the file can be accessed. The consequence of this issue is:
* file is not included in copy/backup, since
Issue already public via netfilter-devel, but no responses so far:
http://www.spinics.net/lists/netfilter-devel/msg20076.html
Other netfilter-devel archives to not show the posts from 28/29.11, e.g.
http://marc.info/?l=netfilter-devel&r=1&b=20&w=2
--
You received this bug notification becau
*** This bug is a security vulnerability ***
Public security bug reported:
With kernel 2.6.32-35-generic and lucid iptables iptables-save does not
save the real iptables entries currently active in nat table, at least
the conntrack match entries --ctorigdst with network are corrupted.
>From my
This is getting really problematic: I also observed the issue on the
base machine, not only within virtualbox guest. The effect there is in
most cases that an open login session remains on tty1, that contains the
passwords in plaintext in some .vim file. Cause:
During double command execution, qui
Update to --destination empty: If empty, destination is filled with
bytes from heap or stack, most likely on the user-side and not in
kernel. The example below uses 4 bytes of -j target as netmask.
iptables -N TEST
iptables -N A
iptables -A TEST --destination "" -p tcp -m t
Public bug reported:
On a hardened, but empty system, where only few other processes are
running, maximum speed IO output to cryptoloop causeD kernel to get
stuck multiple times (~5x), e.g.
echo x | losetup -e aes-cbc-essiv:sha256 -k 256 --pass-fd 0 /dev/loop0 /dev/sda2
dd if=/dev/zero of=/dev/lo
Public bug reported:
Binary package hint: ntpdate
ntpdate on natty (4.2.6p2@1.2194-o) fails to sync with server, while
lucid server ntpdate works
Issue seems to be identical to
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599793
http://bugs.ntp.org/show_bug.cgi?id=1709
Bug was introduced i
So the lightweighted xserver-xorg-core package, which is sufficient to
work with fvwm and other window manager is not sufficient for xdm, which
just displays a banner? A full xserver installation is needed instead?
What is the difference between the
/usr/bin/X binary and the /usr/bin/Xorg binary?
Public bug reported:
Binary package hint: xdm
After a minimal install of xserver and xdm, xdm does not start because X
binary cannot be started. It is possible, that this is not a bug of xdm
itself, please see note of workaround below:
Cause:
File /etc/X11/xdm/Xservers refers to X via /usr/bin
Also at debian http://bugs.debian.org/611990
Still to decide: what does --source "" mean: no host has access or all of them?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/782201
Title:
iptables segf
Segfault confirmed by upstream, fix available: http://git.netfilter.org
/cgi-
bin/gitweb.cgi?p=iptables.git;a=commitdiff_plain;h=4b110b426df7bf486a3e7884c56ebb3487023601
** Bug watch added: Debian Bug tracker #611990
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=611990
--
You received this
Public bug reported:
Binary package hint: iptables
Iptables segfaults if called with an empty source address, e.g. from a
broken script (see upstream
http://marc.info/?l=netfilter&m=130529014111611&w=2)
# iptables -A OUTPUT --source "${NoSuchVar}" -j ACCEPT
May 13 12:47:55 n309eh001 kernel: [ 33
Public bug reported:
Binary package hint: xserver-xorg-core
When booting a minimal natty x desktop with xdm and fvwm, the keyboard
input is sent both to the X server running on vt7 and tty1. The result
is, that the following xdm login occurs both on X and tty1. Since tty1
is faster, x keyboard in
** Attachment added: "Dump of a broken filesystem after running reproducer"
https://bugs.launchpad.net/bugs/754495/+attachment/1999258/+files/2011-04-08-BrokenJfsVolume.bz2
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bu
Public bug reported:
Binary package hint: jfsutils
Power failure leads to file system corruption and data loss, probably
because fsck.jfs does not correctly detect the damages in the first run.
See als jfs mailing list discussion http://www.mail-archive.com/jfs-
discuss...@lists.sourceforge.net/
I see. Just for the records, my issue was fixed by:
cat <> /var/cache/debconf/config.dat
Name: xserver-xorg/config/device/bus_id
Template: xserver-xorg/config/device/bus_id
Value:
Owners: xserver-xorg
EOF
--
Failsafe X support added in proposed upload still doesn't work
https://bugs.launchpad.n
Didn't know that, thought because of
+ exec /usr/share/debconf/frontend /etc/gdm/failsafeDexconf vesa xorg.conf (see
initial post)
that both are linked. Will retry to generate failsafe xorg.conf.
--
Failsafe X support added in proposed upload still doesn't work
https://bugs.launchpad.net/bugs/47
At least dexconf still cannot generate a xorg.conf file, error similar
to one in first post:
[pid 17251] <... read resumed> "GET xserver-xorg/config/device/bus_id\n", 4096)
= 38
[pid 17251] write(7, "10 xserver-xorg/config/device/bus_id doesn't exist\n",
51) = 51
repo proposed activated, versi
Seems that something with centerim build on jaunty is completely broken.
The application is just a collection of memory corruptions, errors
Only simplest test results are reproducable, all other functions are
instable due to memory problems, e.g. it starts with the first DNS-name
resolution of
Register mystery: Order of form fields filled seems important
* fill in order listed in registry form:
Failed (Disconnected)
* fill server name first (localhost:5222)
* fill user name/password afterwards
* use register
OK
--
Forwarding an old message causes SEGV
https://bugs.launchpad.net/bug
Correction:
Button name "Go ahead"
Segfault also if all register fields filled
The segfault occurs only if "register" action is used with first
startup. To reproduce it after successful startup:
rm -rf ~/.centerim
centerim
--
Forwarding an old message causes SEGV
https://bugs.launchpad.net/bu
Tried test on ubuntu-minimal + centerim + jabber (at localhost), but
centerim segfaulted already during registration, so test not successful:
Steps:
apt-get --assume-yes install centerim jabber < /dev/null
gdb centerim
# run
#0 0xb7cea2f5 in std::basic_string,
std::allocator >::basic_strin
The handling of all other command line arguments has changed also, e.g.
mv server.cert $'server.cert\nsomeopt = yyy'
stunnel -c -f -D 4 -v 3 -A 'server.cert
someoption = yyy' -r "${_send_remoteAddress}" -l cat -- cat
file descriptor line 6: Specified option name is not valid here
Since I hope tha
Public bug reported:
Binary package hint: stunnel4
The program /usr/bin/stunnel behaves differently when installed from
stunnel4 compared to stunnel. When executing
stunnel -c -f -A "${_send_serverCert}" -p "${_send_clientCert}" -r
"${_send_remoteAddress}" -l /bin/bash -- tester -c "touch \"aaa
I found a workaround for the perl file to ignore the -S option, so that
calls from old scripts still work, but I haven't looked at the security
consequences for cert-checks.
** Attachment added: "Workaround patch for installed package"
http://launchpadlibrarian.net/24151061/patch
--
stunnel s
It seems that /usr/bin/stunnel is just a compatibility perl-script, that
does not know about the -S option, probably because it cannot map it to
any option in stunnel4.
Since -S 0 can be used to suppress reading of any other certificate
files for validation of remote server/client certs, it would
Public bug reported:
Binary package hint: stunnel4
The -S (source) option is mentioned in the man pages of stunnel4, but is
not available on the command line. The -S option exists in stunnel from
the standard stunnel package on hardy, but was removed or renamed in
stunnel4.
Tested on hardy
** A
Public bug reported:
Binary package hint: bash
When parent of bash terminates, the PPID variable is not updated.
One might also change the documentation to say that PPID will no be updated,
which would make this behavior a "feature"
Testscript as attachment, execute "SleepTest.sh parent" and l
** Attachment added: "SleepTest.sh"
http://launchpadlibrarian.net/23723854/SleepTest.sh
--
Bash PPID is wrong when parent terminates
https://bugs.launchpad.net/bugs/340571
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bu
It seems that this package/version is the standard with ubuntu-hardy. I
found that there is already a new package in the pool/universe
(http://archive.ubuntu.com/ubuntu/pool/universe/s/stunnel4/stunnel4_4.22-2_i386.deb)
which seems to be working on hardy without problems. I'll try to stop it
using
When broken:
# ps aux | grep stunnel
rfiedler 14247 58.1 13.0 57592 33324 pts/2Sl+ 16:21 18:05 stunnel4
tunnel.cfg
rfiedler 14248 0.0 0.2 3692 628 pts/2S+ 16:21 0:00 stunnel4
tunnel.cfg
rfiedler 14249 0.0 0.2 3692 632 pts/2S+ 16:21 0:00 stunnel4
tunnel.cfg
rf
Public bug reported:
Binary package hint: stunnel4
Usually the stunnel4 process main process with lowest IP consumes 100%
of CPU, TCP connections are accepted, but SSL handshake is not started.
The test scenario below will make 1 tests, but usually the test can
be suspended after 500-1000 tes
** Attachment added: "Untested patch for check_smtp"
http://launchpadlibrarian.net/21351361/patch-nagios-plugins-1.4.12
--
nagios check_smtp expects integer instead of double
https://bugs.launchpad.net/bugs/318703
You received this bug notification because you are a member of Ubuntu
Bugs, whi
Public bug reported:
Binary package hint: nagios-plugins-basic
Command execution returns error with double value:
# /usr/lib/nagios/plugins/check_smtp -H localhost -w 0.2
check_smtp: Warning time must be a positive integer
Usage:check_smtp -H host [-p port] [-e expect] [-C command] [-f from addr
Public bug reported:
Binary package hint: centerim
Client segfaults when sending? forwarded message (event)
Steps to reproduce:
* One other user is online, select user and press Ctrl-O (view message history)
* Select a message from this user
* Select Fwd
* Mark the sender itself as recipient
*
Possible patch??
host:~/Tmp$ diff -U 3 /tmp/savelog /usr/bin/savelog
--- /tmp/savelog2007-08-01 12:54:33.0 +0200
+++ /usr/bin/savelog2007-03-05 06:43:41.0 +0100
@@ -194,11 +194,7 @@
if [ -z "$savedir" ]; then
savedir=.
fi
- if [ "${
Public bug reported:
Binary package hint: debianutils
Rolldir is always used relative to the log-file to be rotated but the
man page does not mention anything like that:
-r use rolldir instead of . to roll files
Fixes:
* allow absolute rolldir path
or
* write error message when absol
88 matches
Mail list logo