[Bug 1951491] Re: Can't run snaps: .slice/session-1.scope is not a snap cgroup
Encountered this problem while attempting to run a confined snap from a cronjob. All that is wrong actually is that the systemd user session has not been properly setup. I had to install dbus-user-session and then make sure the /run/user/../bus was initialized by for example runuser -u user /bin/true. Cron by itself won't load pam_systemd in the session because it uses common-session-noninteractive in pam which doesn't load pam_systemd. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1951491 Title: Can't run snaps: .slice/session-1.scope is not a snap cgroup To manage notifications about this bug go to: https://bugs.launchpad.net/x2go/+bug/1951491/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1776489] Re: libxmltooling7 depends on libcurl3, which has been replaced by libcurl4 in Bionic
If you want to try (on your own risk) the Disco Dingo version on Bionic where libxmltooling8 is built against libcurl4, then you can do this: curl -L 'http://mirrors.kernel.org/ubuntu/pool/universe/x/xml-security-c/libxml-security-c20_2.0.2-3_amd64.deb' > libxml-security-c20_2.0.2-3_amd64.deb curl -L 'http://mirrors.kernel.org/ubuntu/pool/universe/l/log4shib/liblog4shib2_2.0.0-2_amd64.deb' > liblog4shib2_2.0.0-2_amd64.deb curl -L 'http://mirrors.kernel.org/ubuntu/pool/universe/x/xmltooling/libxmltooling8_3.0.4-1_amd64.deb' > libxmltooling8_3.0.4-1_amd64.deb curl -L 'http://mirrors.kernel.org/ubuntu/pool/universe/s/shibboleth-sp/shibboleth-sp-common_3.0.4+dfsg1-1_all.deb' > shibboleth-sp-common_3.0.4+dfsg1-1_all.deb curl -L 'http://mirrors.kernel.org/ubuntu/pool/universe/x/xmltooling/xmltooling-schemas_3.0.4-1_all.deb' > xmltooling-schemas_3.0.4-1_all.deb curl -L 'http://mirrors.kernel.org/ubuntu/pool/universe/o/opensaml/opensaml-schemas_3.0.1-1_all.deb' > opensaml-schemas_3.0.1-1_all.deb curl -L 'http://mirrors.kernel.org/ubuntu/pool/universe/s/shibboleth-sp/libshibsp8_3.0.4+dfsg1-1_amd64.deb' > libshibsp8_3.0.4+dfsg1-1_amd64.deb curl -L 'http://mirrors.kernel.org/ubuntu/pool/main/k/krb5/libkrb5support0_1.17-1_amd64.deb' > libkrb5support0_1.17-1_amd64.deb curl -L 'http://mirrors.kernel.org/ubuntu/pool/main/k/krb5/libkrb5-3_1.17-1_amd64.deb' > libkrb5-3_1.17-1_amd64.deb curl -L 'http://mirrors.kernel.org/ubuntu/pool/main/k/krb5/libgssapi-krb5-2_1.17-1_amd64.deb' > libgssapi-krb5-2_1.17-1_amd64.deb curl -L 'http://mirrors.kernel.org/ubuntu/pool/main/k/krb5/libkrb5-3_1.17-1_amd64.deb' > libkrb5-3_1.17-1_amd64.deb curl -L 'http://mirrors.kernel.org/ubuntu/pool/universe/o/opensaml/libsaml10_3.0.1-1_amd64.deb' > libsaml10_3.0.1-1_amd64.deb curl -L 'http://mirrors.kernel.org/ubuntu/pool/universe/s/shibboleth-sp/libshibsp-plugins_3.0.4+dfsg1-1_amd64.deb' > libshibsp-plugins_3.0.4+dfsg1-1_amd64.deb curl -L 'http://mirrors.kernel.org/ubuntu/pool/main/i/init-system-helpers/init-system-helpers_1.56+nmu1_all.deb' > init-system-helpers_1.56+nmu1_all.deb curl -L 'http://mirrors.kernel.org/ubuntu/pool/universe/s/shibboleth-sp/shibboleth-sp-utils_3.0.4+dfsg1-1_amd64.deb' > shibboleth-sp-utils_3.0.4+dfsg1-1_amd64.deb curl -L 'http://mirrors.kernel.org/ubuntu/pool/universe/s/shibboleth-sp/shibboleth-sp2-common_3.0.4+dfsg1-1_all.deb' > shibboleth-sp2-common_3.0.4+dfsg1-1_all.deb curl -L 'http://mirrors.kernel.org/ubuntu/pool/universe/x/xerces-c/libxerces-c3.2_3.2.2+debian-1build1_amd64.deb' > libxerces-c3.2_3.2.2+debian-1build1_amd64.deb curl -L 'http://mirrors.kernel.org/ubuntu/pool/main/i/icu/libicu63_63.1-6_amd64.deb' > libicu63_63.1-6_amd64.deb curl -L 'http://mirrors.kernel.org/ubuntu/pool/universe/s/shibboleth-sp/libapache2-mod-shib_3.0.4+dfsg1-1_amd64.deb' > libapache2-mod-shib_3.0.4+dfsg1-1_amd64.deb apt-get install libcurl4 libxalan-c111 libodbc1 libmemcached11 libfcgi0ldbl dpkg -i libxml-security-c20_2.0.2-3_amd64.deb dpkg -i liblog4shib2_2.0.0-2_amd64.deb dpkg -i libxmltooling8_3.0.4-1_amd64.deb dpkg -i shibboleth-sp-common_3.0.4+dfsg1-1_all.deb dpkg -i xmltooling-schemas_3.0.4-1_all.deb dpkg -i opensaml-schemas_3.0.1-1_all.deb dpkg -i libkrb5-3_1.17-1_amd64.deb dpkg -i libkrb5support0_1.17-1_amd64.deb dpkg -i libgssapi-krb5-2_1.17-1_amd64.deb dpkg -i libshibsp8_3.0.4+dfsg1-1_amd64.deb dpkg -i libkrb5-3_1.17-1_amd64.deb dpkg -i libsaml10_3.0.1-1_amd64.deb dpkg -i libshibsp8_3.0.4+dfsg1-1_amd64.deb dpkg -i libshibsp-plugins_3.0.4+dfsg1-1_amd64.deb dpkg -i libshibsp-plugins_3.0.4+dfsg1-1_amd64.deb dpkg -i init-system-helpers_1.56+nmu1_all.deb dpkg -i shibboleth-sp-utils_3.0.4+dfsg1-1_amd64.deb dpkg -i shibboleth-sp2-common_3.0.4+dfsg1-1_all.deb dpkg -i libicu63_63.1-6_amd64.deb dpkg -i libxerces-c3.2_3.2.2+debian-1build1_amd64.deb dpkg -i libapache2-mod-shib_3.0.4+dfsg1-1_amd64.deb -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1776489 Title: libxmltooling7 depends on libcurl3, which has been replaced by libcurl4 in Bionic To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/moonshot-gss-eap/+bug/1776489/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1651531] Re: libapache2-mod-shib2, no server variables of session
Turns out it is not a bug, but an artefact of the method of testing. If you use domain/handlerPrefix/Login to test your setup, the Apache variables are not set. They are only set when the shib2 module is called by way of a Require rule, and this does not happen if you have free access but call the Login yourself. ** Changed in: shibboleth-sp2 (Ubuntu) Status: New => Invalid ** Converted to question: https://answers.launchpad.net/ubuntu/+source/shibboleth-sp2/+question/407815 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1651531 Title: libapache2-mod-shib2, no server variables of session To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/shibboleth-sp2/+bug/1651531/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1651531] [NEW] libapache2-mod-shib2, no server variables of session
Public bug reported: On Ubuntu 14.04 we have a working shibboleth configuration, which when used in Apache gives the SAML 2.0 attributes of the session in server variables and the REMOTE_USER according to attribute mapping of shibboleth. On Ubuntu 16.04 the same configuration is reported as working by the builtin shibboleth shibd -t configuration test, logging by shibboleth and the Session handler of shibboleth shows that attributes come in and are accurately decoded and mapped, session is established, but the expected Apache server variables remain absent. A scan of wiki entries for Shibboleth shows no needed configuration changes. requestsetting of exportStdVars to true or "on" or 1 also does not help. Example of expected vars: _SERVER["Shib-Application-ID"] default _SERVER["Shib-Session-ID"] _abcdeef0cd3ff507b7f9e2394c625fd94 _SERVER["Shib-Identity-Provider"] http://adfs.example.com/adfs/services/trust _SERVER["Shib-Authentication-Instant"] 2016-12-20T17:03:46.480Z _SERVER["Shib-Authentication-Method"] urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport _SERVER["Shib-AuthnContext-Class"] urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport _SERVER["upn"] ts...@example.com _SERVER["AUTH_TYPE"] shibboleth _SERVER["REMOTE_USER"] ts...@example.com ** Affects: shibboleth-sp2 (Ubuntu) Importance: Undecided Status: New ** Tags: apache saml shibboleth xenial ** Package changed: mpm-itk (Ubuntu) => shibboleth-sp2 (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1651531 Title: libapache2-mod-shib2, no server variables of session To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/shibboleth-sp2/+bug/1651531/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1504162] [NEW] Lingering close on TLS connection
Public bug reported: If mpm-itk is installed TLS connections will linger for Alert timeout of 10 seconds unless the client closes first. Problem can be reproduced with PHP (replace url with your own): php -r '$context=stream_context_create(array("ssl" => array("ciphers" => "HIGH:!SSLv2:!SSLv3")));echo file_get_contents("https://www.example.com/hello",false,$context);' Problem cannot be trivially reproduced with curl because it reads Content-Length and sends close itself. Problem can be fixed by installing newest upstream mpm-itk (mpm- itk-2.4.7-03). apt-get install apache2-dev curl http://mpm-itk.sesse.net/mpm-itk-2.4.7-03.tar.gz > mpm-itk-2.4.7-03.tar.gz tar xf mpm-itk-2.4.7-03.tar.gz cd mpm-itk-2.4.7-03.tar.gz ./configure make make install ** Affects: mpm-itk (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1504162 Title: Lingering close on TLS connection To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mpm-itk/+bug/1504162/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1407990] Re: apache2.4 mod-php5.5 random segmentation faults in zend_stack_push() and zend_hash_find()
Apologies, I didn't realise I was writing in Dutch :-) The PHP project has released a fix for this problem with my cleanup patch. It has been released with 5.6.28 and 5.5.24. It is also part of an Ubuntu security release: http://www.ubuntu.com/usn/usn-2572-1/ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1407990 Title: apache2.4 mod-php5.5 random segmentation faults in zend_stack_push() and zend_hash_find() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1407990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1407990] Re: apache2.4 mod-php5.5 random segmentation faults in zend_stack_push() and zend_hash_find()
Het PHP project heeft een fix uitgebracht voor dit probleem met de cleanup patch die ik heb ingediend, en deze is verwerkt in deze USN: http://www.ubuntu.com/usn/usn-2572-1/ ** Changed in: php5 (Ubuntu) Status: Confirmed => Fix Released ** Changed in: php5 (Ubuntu) Assignee: (unassigned) => Gerrit Venema (gmoniker) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1407990 Title: apache2.4 mod-php5.5 random segmentation faults in zend_stack_push() and zend_hash_find() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1407990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1407990] Re: apache2.4 mod-php5.5 random segmentation faults in zend_stack_push() and zend_hash_find()
The root cause of the problem has been determined to lie with the apache2handler for PHP. It is not sufficiently up to date to function well with Apache 2.4 receiving pipelined requests. A patch for the most common setup has been developed, but it has not yet been integrated upstream. I have also put in an enhancement request at https://bz.apache.org/bugzilla/show_bug.cgi?id=57756, for a configuration option that could provide a fallback for server administrator, because this may equally affect other Apache 2.4 add-on handlers that have not undergone rigorous testing for this use case. ** Bug watch added: bz.apache.org/bugzilla/ #57756 https://bz.apache.org/bugzilla/show_bug.cgi?id=57756 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1407990 Title: apache2.4 mod-php5.5 random segmentation faults in zend_stack_push() and zend_hash_find() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1407990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1407990] Re: apache2.4 mod-php5.5 random segmentation faults in zend_stack_push() and zend_hash_find()
For any parties interested in testing, there is now a patch available at https://bugs.php.net/bug.php?id=68486 which is looking to solve the segfaults that happen in processing pipelined PHP requests in Apache 2.4. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1407990 Title: apache2.4 mod-php5.5 random segmentation faults in zend_stack_push() and zend_hash_find() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1407990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1407990] Re: apache2.4 mod-php5.5 random segmentation faults in zend_stack_push() and zend_hash_find()
This is hopefully the proper place for resolution of this bug. https://bz.apache.org/bugzilla/show_bug.cgi?id=56984 ** Bug watch added: bz.apache.org/bugzilla/ #56984 https://bz.apache.org/bugzilla/show_bug.cgi?id=56984 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1407990 Title: apache2.4 mod-php5.5 random segmentation faults in zend_stack_push() and zend_hash_find() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1407990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1407990] Re: apache2.4 mod-php5.5 random segmentation faults in zend_stack_push() and zend_hash_find()
The bug is instantly reproducible on a fresh Ubuntu 14.04. Install server. apt-get install apache2 php5 netcat Setup a small PHP script with output in /var/www/html/ For Example as test.php shutdown Apache service: apache2ctl stop Disable opcache with semicolon in front in /etc/php5/apache2/conf.d/05-opcache.ini Start Apache debug server in separate shell apache2ctl -X Execute this script (thanks to biggi at stefna dot is): echo -e "GET /test.php HTTP/1.1\nHost: localhost\n\nGET /test.php HTTP/1.1\nHost: localhost\n\n"|nc localhost 80 Result: immediate segfault If you do only one request per connection, no problem If you activate opcache, you will only get one response, the second one appears on the stdout of the debug apache If you fill the opcache it will segfault if it can't fit the script anymore I confirmed the same behaviour on Centos 7 with its default packaged Apache 2.4.6, so this is an upstream bug. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1407990 Title: apache2.4 mod-php5.5 random segmentation faults in zend_stack_push() and zend_hash_find() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1407990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1407990] Re: apache2.4 mod-php5.5 random segmentation faults in zend_stack_push() and zend_hash_find()
We observe regular segfaults on Ubuntu 14.04 LTS with Apache and PHP in its default packages presenting these backtraces in a Coredump file: #0 0x7f9911e619ad in zend_stack_push ( stack=stack@entry=0x7f9912627ca0 , element=element@entry=0x7f9912627c78 , size=size@entry=40) at /build/buildd/php5-5.5.9+dfsg/Zend/zend_stack.c:42 #1 0x7f9911e2d34e in compile_file ( file_handle=file_handle@entry=0x7fffe74e7e00, type=2) at Zend/zend_language_scanner.l:586 #2 0x7f9911e52b2a in dtrace_compile_file (file_handle=0x7fffe74e7e00, type=) at /build/buildd/php5-5.5.9+dfsg/Zend/zend_dtrace.c:40 #3 0x7f9911cdbce4 in phar_compile_file (file_handle=, type=) at /build/buildd/php5-5.5.9+dfsg/ext/phar/phar.c:3383 #4 0x7f990baca1d4 in persistent_compile_file (file_handle=0x7fffe74e7e00, type=2) at /build/buildd/php5-5.5.9+dfsg/ext/opcache/ZendAccelerator.c:1634 #5 0x7f990bd64f19 in ?? () from /usr/lib/php5/20121212/ioncube_loader_lin_5.5.so #6 0x7f9911e645af in zend_execute_scripts (type=type@entry=2, retval=retval@entry=0x0, file_count=file_count@entry=1) at /build/buildd/php5-5.5.9+dfsg/Zend/zend.c:1308 #7 0x7f9911f1452d in php_handler (r=) at /build/buildd/php5-5.5.9+dfsg/sapi/apache2handler/sapi_apache2.c:669 #8 0x7f9918178680 in ap_run_handler (r=0x7f9912f040a0) at config.c:169 #9 0x7f9918178bc9 in ap_invoke_handler (r=r@entry=0x7f9912f040a0) ---Type to continue, or q to quit--- at config.c:439 #10 0x7f991818e16a in ap_process_async_request (r=0x7f9912f040a0) at http_request.c:317 #11 0x7f991818e444 in ap_process_request (r=r@entry=0x7f9912f040a0) at http_request.c:363 #12 0x7f991818af02 in ap_process_http_sync_connection (c=0x7f991479e290) at http_core.c:190 #13 ap_process_http_connection (c=0x7f991479e290) at http_core.c:231 #14 0x7f9918181cc0 in ap_run_process_connection (c=0x7f991479e290) at connection.c:41 #15 0x7f99181820a8 in ap_process_connection (c=c@entry=0x7f991479e290, csd=) at connection.c:202 #16 0x7f991333f767 in child_main (child_num_arg=child_num_arg@entry=92) at prefork.c:704 #17 0x7f991333f9a6 in make_child (s=0x7f99180dfde0, slot=92) at prefork.c:800 #18 0x7f991334060e in perform_idle_server_maintenance (p=) at prefork.c:902 #19 prefork_run (_pconf=, plog=, s=) at prefork.c:1090 #20 0x7f991815f69e in ap_run_mpm (pconf=0x7f9918115028, plog=0x7f99180e3028, s=0x7f99180dfde0) at mpm_common.c:96 #21 0x7f9918158e36 in main (argc=3, argv=0x7fffe74e8508) at main.c:777 PHP is coming in to the stack push function thinking that it is already initialized (stack_max=64) while its elements pointer is null, so it segfaults when trying to store a heap segment in its stack. This may very well be an upstream bug in the PHP SAPI module for Apache. In this case I think this bug report (https://bugs.php.net/bug.php?id=68486) on PHP is highly relevant. It is said to not be present on Apache 2.2 and is probably related to client side pipelining of HTTP 1.1 requests. Regards, Gerrit ** Bug watch added: bugs.php.net/ #68486 http://bugs.php.net/bug.php?id=68486 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1407990 Title: apache2.4 mod-php5.5 random segmentation faults in zend_stack_push() and zend_hash_find() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1407990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs