[Bug 1966125] Re: Suspend (to ram) fails after upgrade from 5.13.0-35-generic to 5.13.0-37-generic
Same issue for me on an AMD system after booting into 5.13.0-37-generic. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1966125 Title: Suspend (to ram) fails after upgrade from 5.13.0-35-generic to 5.13.0-37-generic To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-signed-hwe-5.13/+bug/1966125/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1056626] [NEW] source distributes personal information
Public bug reported: It was reported that the file ubuntu/tests/smsbackups/k800i.smsbackup in gammu source ships with personal information. I have informed the person to contact upstream about the shipping file, but if we could remove this as requested by the person, that would be swell ** Affects: gammu (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1056626 Title: source distributes personal information To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gammu/+bug/1056626/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1053746] [NEW] Cloud-images all run cron jobs simultaneously
Public bug reported: Cloud-images all run their cron jobs simultaneously, causing a large resource usage spike on the hosting physical infrastructure. It would be great if cron run-parts were run with a randomized sleep to spread this load. ** Affects: cron (Ubuntu) Importance: Undecided Assignee: Ben Howard (utlemming) Status: Confirmed ** Tags: cloud-images -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1053746 Title: Cloud-images all run cron jobs simultaneously To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cron/+bug/1053746/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 795355] Re: Intermittent SSL connection faults
On 06/28/2011 04:02 AM, Andreas Hasenack wrote: Do any of you have compression (deflate) enabled server-side on these machines where the error occurs? Deflate was disabled during inital testing on the oem-ibs site. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/795355 Title: Intermittent SSL connection faults To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/795355/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 795355] Re: Intermittent SSL connection faults
Hi I'll try backporting the Natty openssl package and see how it goes. Not using a wildcard cert, although I have tested with one, as well as two seperate certs. I have plenty of Apache debug logs, I'll distill some and upload when I have a moment Here's an ssldump that accompanied the s_client output above: 7 1 0.3464 (0.3464) CS SSLv2 compatible client hello Version 3.1 cipher suites Unknown value 0x39 Unknown value 0x38 Unknown value 0x35 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA TLS_RSA_WITH_3DES_EDE_CBC_SHA SSL2_CK_3DES Unknown value 0x33 Unknown value 0x32 Unknown value 0x2f SSL2_CK_RC2 TLS_RSA_WITH_RC4_128_SHA TLS_RSA_WITH_RC4_128_MD5 SSL2_CK_RC4 TLS_DHE_RSA_WITH_DES_CBC_SHA TLS_DHE_DSS_WITH_DES_CBC_SHA TLS_RSA_WITH_DES_CBC_SHA SSL2_CK_DES TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA TLS_RSA_EXPORT_WITH_DES40_CBC_SHA TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 SSL2_CK_RC2_EXPORT40 TLS_RSA_EXPORT_WITH_RC4_40_MD5 SSL2_CK_RC4_EXPORT40 Unknown value 0xff 7 2 0.3557 (0.0093) SCV3.1(81) Handshake ServerHello Version 3.1 random[32]= 4d f1 5f 69 e8 65 f9 9e 0e 21 fd f8 6e 05 11 bb 45 6b b8 97 49 62 04 68 60 a2 4a 94 11 4a 81 84 session_id[32]= c0 ca 5b 73 a3 9a 33 0a 65 30 8f 28 c2 db d1 d6 47 ff b6 0c bf 48 0f dd 1e 95 33 9b 56 8b 04 3e cipherSuite Unknown value 0x39 compressionMethod NULL 7 3 0.3557 (0.) SCV3.1(3382) Handshake Certificate 7 4 0.3557 (0.) SCV3.1(525) Handshake ServerKeyExchange 7 5 0.3557 (0.) SCV3.1(4) Handshake ServerHelloDone 7 6 0.7052 (0.3494) CSV3.1(2) Alert level fatal value decrypt_error 70.7054 (0.0002) SC TCP FIN 70.7066 (0.0012) CS TCP RST For comparison, here's the ssldump of the prior, successful connection: 6 1 0.3416 (0.3416) CS SSLv2 compatible client hello Version 3.1 cipher suites Unknown value 0x39 Unknown value 0x38 Unknown value 0x35 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA TLS_RSA_WITH_3DES_EDE_CBC_SHA SSL2_CK_3DES Unknown value 0x33 Unknown value 0x32 Unknown value 0x2f SSL2_CK_RC2 TLS_RSA_WITH_RC4_128_SHA TLS_RSA_WITH_RC4_128_MD5 SSL2_CK_RC4 TLS_DHE_RSA_WITH_DES_CBC_SHA TLS_DHE_DSS_WITH_DES_CBC_SHA TLS_RSA_WITH_DES_CBC_SHA SSL2_CK_DES TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA TLS_RSA_EXPORT_WITH_DES40_CBC_SHA TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 SSL2_CK_RC2_EXPORT40 TLS_RSA_EXPORT_WITH_RC4_40_MD5 SSL2_CK_RC4_EXPORT40 Unknown value 0xff 6 2 0.3512 (0.0095) SCV3.1(81) Handshake ServerHello Version 3.1 random[32]= 4d f1 5f 5c 41 3e 94 a9 68 9d 48 73 90 29 b2 08 62 b4 b6 6a 6b 98 ac 81 70 7d 44 a7 0c 6d fe ef session_id[32]= dd 42 bf a7 3b 46 a0 eb 38 19 a0 bf 56 c1 22 17 1c aa b4 0c 97 79 ea b7 90 d1 78 f8 85 7c 00 c0 cipherSuite Unknown value 0x39 compressionMethod NULL 6 3 0.3512 (0.) SCV3.1(3382) Handshake Certificate 6 4 0.3512 (0.) SCV3.1(525) Handshake ServerKeyExchange 6 5 0.3512 (0.) SCV3.1(4) Handshake ServerHelloDone 6 6 0.7370 (0.3858) CSV3.1(134) Handshake ClientKeyExchange 6 7 0.7370 (0.) CSV3.1(1) ChangeCipherSpec 6 8 0.7370 (0.) CSV3.1(48) Handshake 6 9 0.7403 (0.0032) SCV3.1(1) ChangeCipherSpec 6 10 0.7403 (0.) SCV3.1(48) Handshake 6 11 10.9898 (10.2495) SCV3.1(32) Alert 610.9899 (0.) SC TCP FIN 6 12 11.3304 (0.3404) CSV3.1(32) Alert 611.3314 (0.0010) CS TCP FIN -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/795355 Title: Intermittent SSL connection faults To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/795355/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 795355] [NEW] Intermittent SSL connection faults
Public bug reported: Binary package hint: openssl Reported intermittent SSL connection issue on some apache mod_ssl vhosts. Platform: Ubuntu 10.04.2 LTS Tested: Apache2-2.2.14-5ubuntu8.4 and backported 2.2.17-1ubuntu1 from Natty Firefox client will intermittently report: Secure Connection Failed An error occurred during a connection to oem-ibs.canonical.com. Peer's certificate has an invalid signature. (Error code: sec_error_bad_signature) Condition will clear on reload. Occassionally the server will alternately serve a good page followed by an SSL error until Apache is restarted. I am unable to reproduce the condition on demand, but have output from when the fault occurs. When the fault condition occurs it can be reproduced with any SSL client. The fault presents on multiple distinct servers. Initially suspected to be a bug with mod_ssl https://issues.apache.org/bugzilla/show_bug.cgi?id=46952, backport has eliminated this as has anecdotal reports of this same error presented from Dovecot. Tested with SSL certs from different CAs. Example: $ openssl s_client -connect oem-ibs.canonical.com:443 CONNECTED(0003) depth=2 /C=US/O=thawte, Inc./OU=Certification Services Division/OU=(c) 2006 thawte, Inc. - For authorized use only/CN=thawte Primary Root CA verify error:num=20:unable to get local issuer certificate verify return:0 14563:error:0407006A:rsa routines:RSA_padding_check_PKCS1_type_1:block type is not 01:rsa_pk1.c:100: 14563:error:04067072:rsa routines:RSA_EAY_PUBLIC_DECRYPT:padding check failed:rsa_eay.c:697: 14563:error:1408D07B:SSL routines:SSL3_GET_KEY_EXCHANGE:bad signature:s3_clnt.c:1449: ** Affects: openssl (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/795355 Title: Intermittent SSL connection faults To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/795355/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 795355] Re: Intermittent SSL connection faults
And Lucid openssl 0.9.8k-7ubuntu8.6 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/795355 Title: Intermittent SSL connection faults To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/795355/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 326442] Re: Realtime ops hard lockup
Hi I can confirm that this bug doesn't seem to be reproducible any more. Using kernel 2.6.24-26-rt. On Sun, Mar 14, 2010 at 12:54 PM, Jeremy Foshee jeremy.fos...@canonical.com wrote: Hi Darren, This bug was reported a while ago and there hasn't been any activity in it recently. We were wondering if this is still an issue? Can you try with the latest development release of Ubuntu? ISO CD images are available from http://cdimage.ubuntu.com/releases/lucid. If it remains an issue, could you run the following command from a Terminal (Applications-Accessories-Terminal). It will automatically gather and attach updated debug information to this report. apport-collect -p linux 326442 Also, if you could test the latest upstream kernel available that would be great. It will allow additional upstream developers to examine the issue. Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Once you've tested the upstream kernel, please remove the 'needs-upstream- testing' tag. This can be done by clicking on the yellow pencil icon next to the tag located at the bottom of the bug description and deleting the 'needs-upstream-testing' text. Please let us know your results. Thanks in advance. [This is an automated message. Apologies if it has reached you inappropriately; please just reply to this message indicating so.] ** Tags added: needs-kernel-logs ** Tags added: needs-upstream-testing ** Tags added: kj-triage ** Changed in: linux (Ubuntu) Status: New = Incomplete -- Realtime ops hard lockup https://bugs.launchpad.net/bugs/326442 You received this bug notification because you are a direct subscriber of the bug. Status in “linux” package in Ubuntu: Incomplete Bug description: Binary package hint: linux-image-2.6.24-23-rt Using Jack with realtime enabled causes hard lockups on linux-image-2.6.24-23-rt, no problem with linux-image-2.6.24-22-rt or any other previous Hardy kernel with exactly the same configuration. Possibly attributable to: * rt: Updated PREEMPT_RT support to rt21 - LP: #302138 Configuration is Jackd - freebob with M-Audio firewire solo, Ti firewire interface. Description: Ubuntu 8.04.2 Release: 8.04 32bit install. Play and record will intermittently lockup requiring power off to recover. No ping or any other sign of life. Same operations run indefinately on earlier kernels, reproducable. To unsubscribe from this bug, go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/326442/+subscribe -- Realtime ops hard lockup https://bugs.launchpad.net/bugs/326442 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 326442] [NEW] Realtime ops hard lockup
Public bug reported: Binary package hint: linux-image-2.6.24-23-rt Using Jack with realtime enabled causes hard lockups on linux- image-2.6.24-23-rt, no problem with linux-image-2.6.24-22-rt or any other previous Hardy kernel with exactly the same configuration. Possibly attributable to: * rt: Updated PREEMPT_RT support to rt21 - LP: #302138 Configuration is Jackd - freebob with M-Audio firewire solo, Ti firewire interface. Description:Ubuntu 8.04.2 Release:8.04 32bit install. Play and record will intermittently lockup requiring power off to recover. No ping or any other sign of life. Same operations run indefinately on earlier kernels, reproducable. ** Affects: linux (Ubuntu) Importance: Undecided Status: New -- Realtime ops hard lockup https://bugs.launchpad.net/bugs/326442 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 297123] Re: Incorrect (?) quoting means ekiga/libopal can't connect to some sip services
This bug affects Hardy LTS as well. I applied this patch and Ekiga now works fine with Nodephone. -- Incorrect (?) quoting means ekiga/libopal can't connect to some sip services https://bugs.launchpad.net/bugs/297123 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs