Hi,
This is a workaround you can use temporarily:
$ wget -O- http://ddebs.ubuntu.com/dbgsym-release-key.asc | sudo apt-
key add -
$ sudo apt update
The key was extended temporarily.
Best,
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
Public bug reported:
The public key used by the debugging symbols repository
/usr/share/keyrings/ubuntu-dbgsym-keyring.gpg from the package ubuntu-
dbgsym-keyring expired.
$ apt policy ubuntu-dbgsym-keyring
ubuntu-dbgsym-keyring:
Installed: 2020.02.11.2
Candidate: 2020.02.11.2
Version table
> The problem persists if you upgrade from 16.04.3 directly to 17.04 (
as described https://bugs.launchpad.net/ubuntu/+source/network-
manager/+bug/1658921/comments/23 )
I can confirm this. My upgrade path was xenial -> zesty -> artful and I
had to run "touch /etc/NetworkManager/conf.d/10-globally
On Tue, 07 Jun 2016 17:31:19 -
Robie Basak <1588...@bugs.launchpad.net> wrote:
> Thank you for taking the time to report this bug and helping to make
> Ubuntu better.
>
> This is certainly worthy of a release note, and I have edited the
> Xenial release notes to highlight this issue.
>
> Fur
** Description changed:
[Impact]
When a user has configured their authorized_keys file with the directive
"from=" to restrict the usage of those keys, if that server is upgraded
to Xenial (or Wily) the user may get locked out.
[Test Case]
* Create 3 containers (client, trusty,
** Summary changed:
- authorized_keys using from="hostnamee" no longer work when upgrading to Xenial
+ authorized_keys using from="hostname" no longer work when upgrading to Xenial
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed
I'm filing this bug as way to document this change in the behavior and
how to restore trusty's behavior, but also to get feedback from
Foundations if this is something that could be fixed in the distro when
a openssh-server is being upgraded from older versions.
--
You received this bug notificat
Public bug reported:
[Impact]
When a user has configured their authorized_keys file with the directive
"from=" to restrict the usage of those keys, if that server is upgraded
to Xenial (or Wily) the user may get locked out.
[Test Case]
* Create 3 containers (client, trusty, xenial)
$ lxc laun
ibus has to be started after gnome-settings-daemon, otherwise the later
will override changes in the environment
[...]
gnome-settings-daemon &
ibus --daemonize --xim --replace
[...]
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribe
** Changed in: ibus (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ibus in Ubuntu.
https://bugs.launchpad.net/bugs/1408333
Title:
ibus doesn't restore last keyboard layout selected af
** Changed in: openldap (Ubuntu Precise)
Assignee: (unassigned) => Felipe Reyes (freyes)
** Changed in: openldap (Ubuntu Trusty)
Assignee: (unassigned) => Felipe Reyes (freyes)
** Changed in: openldap (Ubuntu Utopic)
Assignee: (unassigned) => Felipe Reyes (freyes)
** C
Marc,
I tested these patches against two scenarios: 1) single node with
default configuration and phpldapadmin, 2) a two nodes scenario, 1 node
configures a relay and translucent proxy and connects to the second one
which has a default configuration. For details of each configuration
please see at
Do you want me to
reupload the patch?
Best,
--
Felipe Reyes
Software Sustaining Engineer @ Canonical
STS Engineering Team
# Email: felipe.re...@canonical.com (GPG:0x9B1FFF39)
# Phone: +56 9 7640 7887
# Launchpad: ~freyes | IRC: freyes
--
You received this bug notification because you are a m
** Summary changed:
- [SRU] denial of service via an LDAP search query with attrsOnly set to true
(CVE-2012-1164)
+ [SRU] denial of service via an LDAP search query (CVE-2012-1164,
CVE-2013-4449, CVE-2015-1545)
--
You received this bug notification because you are a member of Ubuntu
Touch seed
Patch for utopic to fix CVE-2013-4449 and CVE-2015-1545
** Patch added: "lp1446809_utopic.debdiff"
https://bugs.launchpad.net/ubuntu/precise/+source/openldap/+bug/1446809/+attachment/4400528/+files/lp1446809_utopic.debdiff
--
You received this bug notification because you are a member of Ubu
Patch for vivid to fix CVE-2013-4449 and CVE-2015-1545
** Patch added: "lp1446809_vivid.patch"
https://bugs.launchpad.net/ubuntu/precise/+source/openldap/+bug/1446809/+attachment/4400529/+files/lp1446809_vivid.patch
--
You received this bug notification because you are a member of Ubuntu
Tou
Patch for trusty to fix CVE-2013-4449 and CVE-2015-1545
** Patch added: "lp1446809_trusty.debdiff"
https://bugs.launchpad.net/ubuntu/precise/+source/openldap/+bug/1446809/+attachment/4400527/+files/lp1446809_trusty.debdiff
--
You received this bug notification because you are a member of Ubu
Here I'm attaching a new version of the patch for precise that includes
fixes for CVE-2012-1164, CVE-2013-4449 and CVE-2015-1545
Pending to add patches to fix CVE-2013-4449 and CVE-2015-1545 in trusty,
utopic, vivid and wily.
** Description changed:
[Impact]
- * slapd in OpenLDAP before 2.4
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-4449
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-1545
** Attachment removed: "lp1446809_precise.debdiff"
https://bugs.launchpad.net/ubuntu/precise/+source/openldap/+bug/1446809/+attachment/4392199/
** Tags added: sts
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1439649
Title:
Pacemaker unable to communicate with corosync on restart under lxc
Status in lxc package in U
** Tags removed: patch
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openldap in Ubuntu.
https://bugs.launchpad.net/bugs/1446809
Title:
[SRU] denial of service via an LDAP search query with attrsOnly set to
true (CVE-20
I'm seeing this problem in another environment, similar deployment (3
lxc containers)
Apr 20 16:39:26 juju-machine-3-lxc-4 crm_verify[31774]: notice: crm_log_args:
Invoked: crm_verify -V -p
Apr 20 16:39:27 juju-machine-3-lxc-4 cibadmin[31786]: notice: crm_log_args:
Invoked: cibadmin -p -P
** Patch added: "lp1446809_precise.debdiff"
https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/1446809/+attachment/4392199/+files/lp1446809_precise.debdiff
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openldap in U
** Description changed:
[Impact]
* slapd in OpenLDAP before 2.4.30 allows remote attackers to cause a
denial of service (assertion failure and daemon exit) via an LDAP search
query with attrsOnly set to true, which causes empty attributes to be
returned.
* Trusty ships 2.4.31 whi
** Summary changed:
- denial of service via an LDAP search query with attrsOnly set to true
(CVE-2012-1164)
+ [SRU] denial of service via an LDAP search query with attrsOnly set to true
(CVE-2012-1164)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packag
** Description changed:
[Impact]
* slapd in OpenLDAP before 2.4.30 allows remote attackers to cause a
denial of service (assertion failure and daemon exit) via an LDAP search
query with attrsOnly set to true, which causes empty attributes to be
returned.
* Trusty ships 2.4.31 whi
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-1164
** Changed in: openldap (Ubuntu)
Assignee: (unassigned) => Felipe Reyes (freyes)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openldap
Public bug reported:
[Impact]
* slapd in OpenLDAP before 2.4.30 allows remote attackers to cause a
denial of service (assertion failure and daemon exit) via an LDAP search
query with attrsOnly set to true, which causes empty attributes to be
returned.
* Trusty ships 2.4.31 which comes with a fix
Here I'm attaching a debdiff with the backported fix.
** Changed in: util-linux (Ubuntu Utopic)
Assignee: (unassigned) => Felipe Reyes (freyes)
** Summary changed:
- SRU: exfat not detected by blkid
+ [SRU] exfat not detected by blkid
** Patch added: "lp_1393542_utopic.debdi
** Tags added: cts
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1386840
Title:
[SRU] failure to start a container
Status in lxc package in Ubuntu:
Fix Released
Status in
Here I'm attaching a patch built on top of the latest version of the
package (1.1.0~alpha2-0ubuntu3.1)
** Patch removed: "utopic_lp1386840.debdiff"
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1386840/+attachment/4311145/+files/utopic_lp1386840.debdiff
** Patch added: "lp1386840_utopic.
start a container
+ [SRU] failure to start a container
** Changed in: lxc (Ubuntu Trusty)
Assignee: Felipe Reyes (freyes) => (unassigned)
** Patch added: "utopic_lp1386840.debdiff"
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1386840/+attachment/4311145/+files/utopic
** Changed in: lxc (Ubuntu Trusty)
Assignee: (unassigned) => Felipe Reyes (freyes)
** Changed in: lxc (Ubuntu Utopic)
Assignee: (unassigned) => Felipe Reyes (freyes)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscri
Public bug reported:
Hello,
ibus isn't restoring the last keyboard layout selected when is used in a
stripped down combination of xfce and gnome-settings-daemon. I could isolate
the issue to a minimal Ubuntu installation and detect how ibus behaves
different depending if /org/gnome/desktop/input-
*** This bug is a duplicate of bug 1374721 ***
https://bugs.launchpad.net/bugs/1374721
** This bug has been marked a duplicate of bug 1374721
ibus-daemon uses 100% CPU when using gnome-calculator
--
You received this bug notification because you are a member of Ubuntu
Touch seeded package
I'm running utopic, after upgrading to lxc-1.1.0~alpha2-0ubuntu3, the
bug went away
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1346815
Title:
lxc-clone causes duplicate MA
36 matches
Mail list logo