[Bug 1951491] Re: Can't run snaps: .slice/session-1.scope is not a snap cgroup

2024-03-08 Thread Gerrit Venema
Encountered this problem while attempting to run a confined snap from a
cronjob.

All that is wrong actually is that the systemd user session has not been
properly setup.

I had to install dbus-user-session and then make sure the
/run/user/../bus was initialized by for example runuser -u user
/bin/true.

Cron by itself won't load pam_systemd in the session because it uses
common-session-noninteractive in pam which doesn't load pam_systemd.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1951491

Title:
  Can't run snaps: .slice/session-1.scope is not a snap cgroup

To manage notifications about this bug go to:
https://bugs.launchpad.net/x2go/+bug/1951491/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1776489] Re: libxmltooling7 depends on libcurl3, which has been replaced by libcurl4 in Bionic

2019-10-02 Thread Gerrit Venema
If you want to try (on your own risk) the Disco Dingo version on Bionic
where libxmltooling8 is built against libcurl4, then you can do this:


curl -L 
'http://mirrors.kernel.org/ubuntu/pool/universe/x/xml-security-c/libxml-security-c20_2.0.2-3_amd64.deb'
 > libxml-security-c20_2.0.2-3_amd64.deb
curl -L 
'http://mirrors.kernel.org/ubuntu/pool/universe/l/log4shib/liblog4shib2_2.0.0-2_amd64.deb'
 > liblog4shib2_2.0.0-2_amd64.deb
curl -L 
'http://mirrors.kernel.org/ubuntu/pool/universe/x/xmltooling/libxmltooling8_3.0.4-1_amd64.deb'
 > libxmltooling8_3.0.4-1_amd64.deb
curl -L 
'http://mirrors.kernel.org/ubuntu/pool/universe/s/shibboleth-sp/shibboleth-sp-common_3.0.4+dfsg1-1_all.deb'
 > shibboleth-sp-common_3.0.4+dfsg1-1_all.deb
curl -L 
'http://mirrors.kernel.org/ubuntu/pool/universe/x/xmltooling/xmltooling-schemas_3.0.4-1_all.deb'
 > xmltooling-schemas_3.0.4-1_all.deb
curl -L 
'http://mirrors.kernel.org/ubuntu/pool/universe/o/opensaml/opensaml-schemas_3.0.1-1_all.deb'
 > opensaml-schemas_3.0.1-1_all.deb
curl -L 
'http://mirrors.kernel.org/ubuntu/pool/universe/s/shibboleth-sp/libshibsp8_3.0.4+dfsg1-1_amd64.deb'
 > libshibsp8_3.0.4+dfsg1-1_amd64.deb
curl -L 
'http://mirrors.kernel.org/ubuntu/pool/main/k/krb5/libkrb5support0_1.17-1_amd64.deb'
 > libkrb5support0_1.17-1_amd64.deb
curl -L 
'http://mirrors.kernel.org/ubuntu/pool/main/k/krb5/libkrb5-3_1.17-1_amd64.deb' 
> libkrb5-3_1.17-1_amd64.deb
curl -L 
'http://mirrors.kernel.org/ubuntu/pool/main/k/krb5/libgssapi-krb5-2_1.17-1_amd64.deb'
 > libgssapi-krb5-2_1.17-1_amd64.deb
curl -L 
'http://mirrors.kernel.org/ubuntu/pool/main/k/krb5/libkrb5-3_1.17-1_amd64.deb' 
> libkrb5-3_1.17-1_amd64.deb
curl -L 
'http://mirrors.kernel.org/ubuntu/pool/universe/o/opensaml/libsaml10_3.0.1-1_amd64.deb'
 > libsaml10_3.0.1-1_amd64.deb
curl -L 
'http://mirrors.kernel.org/ubuntu/pool/universe/s/shibboleth-sp/libshibsp-plugins_3.0.4+dfsg1-1_amd64.deb'
 > libshibsp-plugins_3.0.4+dfsg1-1_amd64.deb
curl -L 
'http://mirrors.kernel.org/ubuntu/pool/main/i/init-system-helpers/init-system-helpers_1.56+nmu1_all.deb'
 > init-system-helpers_1.56+nmu1_all.deb
curl -L 
'http://mirrors.kernel.org/ubuntu/pool/universe/s/shibboleth-sp/shibboleth-sp-utils_3.0.4+dfsg1-1_amd64.deb'
 > shibboleth-sp-utils_3.0.4+dfsg1-1_amd64.deb
curl -L 
'http://mirrors.kernel.org/ubuntu/pool/universe/s/shibboleth-sp/shibboleth-sp2-common_3.0.4+dfsg1-1_all.deb'
 > shibboleth-sp2-common_3.0.4+dfsg1-1_all.deb
curl -L 
'http://mirrors.kernel.org/ubuntu/pool/universe/x/xerces-c/libxerces-c3.2_3.2.2+debian-1build1_amd64.deb'
 > libxerces-c3.2_3.2.2+debian-1build1_amd64.deb
curl -L 
'http://mirrors.kernel.org/ubuntu/pool/main/i/icu/libicu63_63.1-6_amd64.deb' > 
libicu63_63.1-6_amd64.deb
curl -L 
'http://mirrors.kernel.org/ubuntu/pool/universe/s/shibboleth-sp/libapache2-mod-shib_3.0.4+dfsg1-1_amd64.deb'
 > libapache2-mod-shib_3.0.4+dfsg1-1_amd64.deb

apt-get install libcurl4 libxalan-c111 libodbc1 libmemcached11 libfcgi0ldbl
dpkg -i libxml-security-c20_2.0.2-3_amd64.deb
dpkg -i liblog4shib2_2.0.0-2_amd64.deb
dpkg -i libxmltooling8_3.0.4-1_amd64.deb
dpkg -i shibboleth-sp-common_3.0.4+dfsg1-1_all.deb
dpkg -i xmltooling-schemas_3.0.4-1_all.deb
dpkg -i opensaml-schemas_3.0.1-1_all.deb
dpkg -i libkrb5-3_1.17-1_amd64.deb
dpkg -i libkrb5support0_1.17-1_amd64.deb
dpkg -i libgssapi-krb5-2_1.17-1_amd64.deb
dpkg -i libshibsp8_3.0.4+dfsg1-1_amd64.deb
dpkg -i libkrb5-3_1.17-1_amd64.deb
dpkg -i libsaml10_3.0.1-1_amd64.deb
dpkg -i libshibsp8_3.0.4+dfsg1-1_amd64.deb
dpkg -i libshibsp-plugins_3.0.4+dfsg1-1_amd64.deb
dpkg -i libshibsp-plugins_3.0.4+dfsg1-1_amd64.deb
dpkg -i init-system-helpers_1.56+nmu1_all.deb
dpkg -i shibboleth-sp-utils_3.0.4+dfsg1-1_amd64.deb
dpkg -i shibboleth-sp2-common_3.0.4+dfsg1-1_all.deb
dpkg -i libicu63_63.1-6_amd64.deb
dpkg -i libxerces-c3.2_3.2.2+debian-1build1_amd64.deb
dpkg -i libapache2-mod-shib_3.0.4+dfsg1-1_amd64.deb

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1776489

Title:
  libxmltooling7 depends on libcurl3, which has been replaced by
  libcurl4 in Bionic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/moonshot-gss-eap/+bug/1776489/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1651531] Re: libapache2-mod-shib2, no server variables of session

2016-12-21 Thread Gerrit Venema
Turns out it is not a bug, but an artefact of the method of testing.

If you use domain/handlerPrefix/Login to test your setup, the Apache
variables are not set. They are only set when the shib2 module is called
by way of a Require rule, and this does not happen if you have free
access but call the Login yourself.

** Changed in: shibboleth-sp2 (Ubuntu)
   Status: New => Invalid

** Converted to question:
   https://answers.launchpad.net/ubuntu/+source/shibboleth-sp2/+question/407815

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1651531

Title:
  libapache2-mod-shib2, no server variables of session

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/shibboleth-sp2/+bug/1651531/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1651531] [NEW] libapache2-mod-shib2, no server variables of session

2016-12-20 Thread Gerrit Venema
Public bug reported:

On Ubuntu 14.04 we have a working shibboleth configuration, which when
used in Apache gives the SAML 2.0 attributes of the session in server
variables and the REMOTE_USER according to attribute mapping of
shibboleth.

On Ubuntu 16.04 the same configuration is reported as working by the
builtin shibboleth shibd -t configuration test, logging by shibboleth
and the Session handler of shibboleth shows that attributes come in and
are accurately decoded and mapped, session is established, but the
expected Apache server variables remain absent.

A scan of wiki entries for Shibboleth shows no needed configuration
changes. requestsetting of exportStdVars to true or "on" or 1 also does
not help.

Example of expected vars:
_SERVER["Shib-Application-ID"]  default
_SERVER["Shib-Session-ID"]  _abcdeef0cd3ff507b7f9e2394c625fd94
_SERVER["Shib-Identity-Provider"]   
http://adfs.example.com/adfs/services/trust
_SERVER["Shib-Authentication-Instant"]  2016-12-20T17:03:46.480Z
_SERVER["Shib-Authentication-Method"]   
urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
_SERVER["Shib-AuthnContext-Class"]  
urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
_SERVER["upn"]  ts...@example.com
_SERVER["AUTH_TYPE"] shibboleth
_SERVER["REMOTE_USER"]  ts...@example.com

** Affects: shibboleth-sp2 (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: apache saml shibboleth xenial

** Package changed: mpm-itk (Ubuntu) => shibboleth-sp2 (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1651531

Title:
  libapache2-mod-shib2, no server variables of session

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/shibboleth-sp2/+bug/1651531/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1504162] [NEW] Lingering close on TLS connection

2015-10-08 Thread Gerrit Venema
Public bug reported:

If mpm-itk is installed TLS connections will linger for Alert timeout of
10 seconds unless the client closes first.

Problem can be reproduced with PHP (replace url with your own):

php -r '$context=stream_context_create(array("ssl" => array("ciphers" =>
"HIGH:!SSLv2:!SSLv3")));echo
file_get_contents("https://www.example.com/hello",false,$context);'

Problem cannot be trivially reproduced with curl because it reads
Content-Length and sends close itself.

Problem can be fixed by installing newest upstream mpm-itk (mpm-
itk-2.4.7-03).

apt-get install apache2-dev
curl http://mpm-itk.sesse.net/mpm-itk-2.4.7-03.tar.gz > mpm-itk-2.4.7-03.tar.gz
tar xf mpm-itk-2.4.7-03.tar.gz
cd mpm-itk-2.4.7-03.tar.gz
./configure
make
make install

** Affects: mpm-itk (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1504162

Title:
  Lingering close on TLS connection

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mpm-itk/+bug/1504162/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1407990] Re: apache2.4 mod-php5.5 random segmentation faults in zend_stack_push() and zend_hash_find()

2015-04-21 Thread Gerrit Venema
Apologies, I didn't realise I was writing in Dutch :-)

The PHP project has released a fix for this problem with my cleanup
patch. It has been released with 5.6.28 and 5.5.24. It is also part of
an Ubuntu security release: http://www.ubuntu.com/usn/usn-2572-1/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1407990

Title:
  apache2.4 mod-php5.5 random segmentation faults in zend_stack_push()
  and  zend_hash_find()

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1407990/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1407990] Re: apache2.4 mod-php5.5 random segmentation faults in zend_stack_push() and zend_hash_find()

2015-04-21 Thread Gerrit Venema
Het PHP project heeft een fix uitgebracht voor dit probleem met de cleanup 
patch die ik heb ingediend, en deze is verwerkt in deze USN:
http://www.ubuntu.com/usn/usn-2572-1/

** Changed in: php5 (Ubuntu)
   Status: Confirmed => Fix Released

** Changed in: php5 (Ubuntu)
 Assignee: (unassigned) => Gerrit Venema (gmoniker)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1407990

Title:
  apache2.4 mod-php5.5 random segmentation faults in zend_stack_push()
  and  zend_hash_find()

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1407990/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1407990] Re: apache2.4 mod-php5.5 random segmentation faults in zend_stack_push() and zend_hash_find()

2015-03-25 Thread Gerrit Venema
The root cause of the problem has been determined to lie with the
apache2handler for PHP. It is not sufficiently up to date to function
well with Apache 2.4 receiving pipelined requests. A patch for the most
common setup has been developed, but it has not yet been integrated
upstream.

I have also put in an enhancement request at
https://bz.apache.org/bugzilla/show_bug.cgi?id=57756, for a
configuration option that could provide a fallback for server
administrator, because this may equally affect other Apache 2.4 add-on
handlers that have not undergone rigorous testing for this use case.

** Bug watch added: bz.apache.org/bugzilla/ #57756
   https://bz.apache.org/bugzilla/show_bug.cgi?id=57756

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1407990

Title:
  apache2.4 mod-php5.5 random segmentation faults in zend_stack_push()
  and  zend_hash_find()

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1407990/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1407990] Re: apache2.4 mod-php5.5 random segmentation faults in zend_stack_push() and zend_hash_find()

2015-03-19 Thread Gerrit Venema
For any parties interested in testing, there is now a patch available at
https://bugs.php.net/bug.php?id=68486 which is looking to solve the
segfaults that happen in processing pipelined PHP requests in Apache
2.4.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1407990

Title:
  apache2.4 mod-php5.5 random segmentation faults in zend_stack_push()
  and  zend_hash_find()

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1407990/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1407990] Re: apache2.4 mod-php5.5 random segmentation faults in zend_stack_push() and zend_hash_find()

2015-03-12 Thread Gerrit Venema
This is hopefully the proper place for resolution of this bug.

https://bz.apache.org/bugzilla/show_bug.cgi?id=56984

** Bug watch added: bz.apache.org/bugzilla/ #56984
   https://bz.apache.org/bugzilla/show_bug.cgi?id=56984

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1407990

Title:
  apache2.4 mod-php5.5 random segmentation faults in zend_stack_push()
  and  zend_hash_find()

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1407990/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1407990] Re: apache2.4 mod-php5.5 random segmentation faults in zend_stack_push() and zend_hash_find()

2015-03-12 Thread Gerrit Venema
The bug is instantly reproducible on a fresh Ubuntu 14.04.

Install server.
apt-get install apache2 php5 netcat

Setup a small PHP script with output in /var/www/html/
For Example as test.php


shutdown Apache service:
apache2ctl stop

Disable opcache with semicolon in front in
/etc/php5/apache2/conf.d/05-opcache.ini

Start Apache debug server in separate shell
apache2ctl -X

Execute this script (thanks to biggi at stefna dot is):
echo -e "GET /test.php HTTP/1.1\nHost: localhost\n\nGET /test.php 
HTTP/1.1\nHost: localhost\n\n"|nc localhost 80

Result: immediate segfault

If you do only one request per connection, no problem
If you activate opcache, you will only get one response, the second one appears 
on the stdout of the debug apache
If you fill the opcache it will segfault if it can't fit the script anymore

I confirmed the same behaviour on Centos 7 with its default packaged
Apache 2.4.6, so this is an upstream bug.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1407990

Title:
  apache2.4 mod-php5.5 random segmentation faults in zend_stack_push()
  and  zend_hash_find()

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1407990/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1407990] Re: apache2.4 mod-php5.5 random segmentation faults in zend_stack_push() and zend_hash_find()

2015-03-10 Thread Gerrit Venema
We observe regular segfaults on Ubuntu 14.04 LTS with Apache and PHP in
its default packages presenting these backtraces in a Coredump file:

#0  0x7f9911e619ad in zend_stack_push (
stack=stack@entry=0x7f9912627ca0 ,
element=element@entry=0x7f9912627c78 ,
size=size@entry=40) at /build/buildd/php5-5.5.9+dfsg/Zend/zend_stack.c:42
#1  0x7f9911e2d34e in compile_file (
file_handle=file_handle@entry=0x7fffe74e7e00, type=2)
at Zend/zend_language_scanner.l:586
#2  0x7f9911e52b2a in dtrace_compile_file (file_handle=0x7fffe74e7e00,
type=)
at /build/buildd/php5-5.5.9+dfsg/Zend/zend_dtrace.c:40
#3  0x7f9911cdbce4 in phar_compile_file (file_handle=,
type=) at /build/buildd/php5-5.5.9+dfsg/ext/phar/phar.c:3383
#4  0x7f990baca1d4 in persistent_compile_file (file_handle=0x7fffe74e7e00,
type=2) at /build/buildd/php5-5.5.9+dfsg/ext/opcache/ZendAccelerator.c:1634
#5  0x7f990bd64f19 in ?? ()
   from /usr/lib/php5/20121212/ioncube_loader_lin_5.5.so
#6  0x7f9911e645af in zend_execute_scripts (type=type@entry=2,
retval=retval@entry=0x0, file_count=file_count@entry=1)
at /build/buildd/php5-5.5.9+dfsg/Zend/zend.c:1308
#7  0x7f9911f1452d in php_handler (r=)
at /build/buildd/php5-5.5.9+dfsg/sapi/apache2handler/sapi_apache2.c:669
#8  0x7f9918178680 in ap_run_handler (r=0x7f9912f040a0) at config.c:169
#9  0x7f9918178bc9 in ap_invoke_handler (r=r@entry=0x7f9912f040a0)
---Type  to continue, or q  to quit---
at config.c:439
#10 0x7f991818e16a in ap_process_async_request (r=0x7f9912f040a0)
at http_request.c:317
#11 0x7f991818e444 in ap_process_request (r=r@entry=0x7f9912f040a0)
at http_request.c:363
#12 0x7f991818af02 in ap_process_http_sync_connection (c=0x7f991479e290)
at http_core.c:190
#13 ap_process_http_connection (c=0x7f991479e290) at http_core.c:231
#14 0x7f9918181cc0 in ap_run_process_connection (c=0x7f991479e290)
at connection.c:41
#15 0x7f99181820a8 in ap_process_connection (c=c@entry=0x7f991479e290,
csd=) at connection.c:202
#16 0x7f991333f767 in child_main (child_num_arg=child_num_arg@entry=92)
at prefork.c:704
#17 0x7f991333f9a6 in make_child (s=0x7f99180dfde0, slot=92)
at prefork.c:800
#18 0x7f991334060e in perform_idle_server_maintenance (p=)
at prefork.c:902
#19 prefork_run (_pconf=, plog=,
s=) at prefork.c:1090
#20 0x7f991815f69e in ap_run_mpm (pconf=0x7f9918115028,
plog=0x7f99180e3028, s=0x7f99180dfde0) at mpm_common.c:96
#21 0x7f9918158e36 in main (argc=3, argv=0x7fffe74e8508) at main.c:777

PHP is coming in to the stack push function thinking that it is already
initialized (stack_max=64) while its elements pointer is null, so it
segfaults when trying to store a heap segment in its stack.

This may very well be an upstream bug in the PHP SAPI module for Apache.
In this case I think this bug report
(https://bugs.php.net/bug.php?id=68486) on PHP is highly relevant. It is
said to not be present on Apache 2.2 and is probably related to client
side pipelining of HTTP 1.1 requests.

Regards,
Gerrit

** Bug watch added: bugs.php.net/ #68486
   http://bugs.php.net/bug.php?id=68486

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1407990

Title:
  apache2.4 mod-php5.5 random segmentation faults in zend_stack_push()
  and  zend_hash_find()

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1407990/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs