[Bug 1716429] Re: pykerberos for trusty does not include CVE-2015-3206 fix

2017-10-15 Thread Mathieu Lafon
Hi Steve,

> When debian fixed this issue [...], they left the default to off, in order to 
> not break [...]
> The update for Ubuntu 12.04 LTS included this default.

You're correct about debian, but this is not exactly what is in the 12.04 LTS 
update. The patch for precise has two issues:
- The default value for 'verify' in the source code (src/kerberos.c) is 1 
(enabled) although pysrc/kerberos.py (only used for documentation) has 
'verify=False'
- The 'verify' argument was not made optional in the PyArg_ParseTuple() call so 
whatever default value was specified, the call would fail if there was not 5 
parameters.

So 12.04 LTS already broke existing setups (and I was personally
impacted at that time).

The patch included in xenial has then fixes these issues:

pykerberos (1.1.5-2):
  * [d3133b6] Set verify=True in docs too.  This makes the docs consistent
with the default behaviour of the function.
  * [792f3b6] Make verify option really optional. So far it correctly
defaulted to true but couldn't be skipped.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1716429

Title:
  pykerberos for trusty does not include CVE-2015-3206 fix

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pykerberos/+bug/1716429/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1716429] Re: pykerberos for trusty does not include CVE-2015-3206 fix

2017-10-05 Thread Mathieu Lafon
Here is a new debdiff with the following changes:
- Updated priority in changelog
- Added DEP-3 headers in included patch
- Removed const qualifier

Regards.

** Patch added: "pykerberos_1.1+svn10616-2_1.1+svn10616-2ubuntu0.1.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/pykerberos/+bug/1716429/+attachment/4962596/+files/pykerberos_1.1+svn10616-2_1.1+svn10616-2ubuntu0.1.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1716429

Title:
  pykerberos for trusty does not include CVE-2015-3206 fix

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pykerberos/+bug/1716429/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1716429] Re: pykerberos for trusty does not include CVE-2015-3206 fix

2017-09-13 Thread Mathieu Lafon
Hello Simon,

On which patch do you expect me to add DEP-3 header? Is it the debdiff
or the included patch (Add-KDC-authenticity-verification-support-
CVE-2015-3206.patch)?

Regarding upstream, the patch has been included in 1.1.6 and updated in
1.1.10 regarding the 'verify' option (should have been optional but it
was not the case in the first patch).

Ref:
* 
https://github.com/02strich/pykerberos/commit/02d13860b25fab58e739f0e000bed0067b7c6f9c
* 
https://github.com/02strich/pykerberos/commit/5867201f1b9c682402aa9b495a654b8f346c8784

Regarding the ubuntu versions:
* precise: based on 1.1+svn4895, patch included
* trusty: based on 1.1+svn10616, patch *not* included
* vivid: based on 1.1.5, patch *not* included
* xenial: based on 1.1.5, patch included (updated with second fix)
* zesty: based on 1.1.5, patch included (updated with second fix)
* artful: based on 1.1.5, patch included (updated with second fix)

So only trusty and vivid lack the security patch. I don't know if
there's a need to patch vivid as it has already reached EOL.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1716429

Title:
  pykerberos for trusty does not include CVE-2015-3206 fix

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pykerberos/+bug/1716429/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1504781] Re: lxc-test-ubuntu hangs forever in trusty-proposed with Linux 3.13.0-66: AppArmor denies /dev/ptmx mounting

2015-10-27 Thread Mathieu Lafon
I'm also interested by an update of the lxc package for precise.

The attached patch is working for me (add "/dev/pts/ptmx -> /dev/ptmx"
instead of "/dev/pts/ptmx/ -> /dev/ptmx/"). Note that keeping the
previous rule is required for not breaking old kernels.

** Patch added: "0075-lxc-apparmor-update.patch"
   
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1504781/+attachment/4506835/+files/0075-lxc-apparmor-update.patch

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1504781

Title:
  lxc-test-ubuntu hangs forever in trusty-proposed with Linux 3.13.0-66:
  AppArmor denies /dev/ptmx mounting

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1504781/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 989675] [NEW] names_cache memory leak in unionfs module

2012-04-27 Thread Mathieu Lafon
Public bug reported:

There is a kernel memory leak in the unionfs 1 module which can leak
names_cache entries (slab allocated). After a long time, this can lead
to a general OOM situation as they will never be freed.

Fix is available since a long time but is not included in hardy.

See:
  http://comments.gmane.org/gmane.comp.file-systems.unionfs.general/2447

$ grep names_cache /proc/slabinfo 
names_cache   144557 144558   409622 : tunables000 : 
slabdata  72279  72279  0
( = 564 MB )

Patch for linux-ubuntu-modules included.

** Affects: linux-ubuntu-modules-2.6.24 (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/989675

Title:
  names_cache memory leak in unionfs module

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-ubuntu-modules-2.6.24/+bug/989675/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 989675] Re: names_cache memory leak in unionfs module

2012-04-27 Thread Mathieu Lafon
** Patch added: "Patch for unionfs memory leak"
   
https://bugs.launchpad.net/bugs/989675/+attachment/3108559/+files/unionfs-names-leak.patch

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/989675

Title:
  names_cache memory leak in unionfs module

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-ubuntu-modules-2.6.24/+bug/989675/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 799656] Re: package samba-common 2:3.4.7~dfsg-1ubuntu3.6 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1

2011-06-21 Thread Lafon
No. What happened was I purged the package, reinstalled and it finished
properly. then it happened to the smbclient, so I'm more inclined to
think that it was my own computer rather than a general bug.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/799656

Title:
  package samba-common 2:3.4.7~dfsg-1ubuntu3.6 failed to
  install/upgrade: subprocess installed post-installation script
  returned error exit status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/799656/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 799656] Re: package samba-common 2:3.4.7~dfsg-1ubuntu3.6 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1

2011-06-20 Thread Lafon
-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/799656

Title:
  package samba-common 2:3.4.7~dfsg-1ubuntu3.6 failed to
  install/upgrade: subprocess installed post-installation script
  returned error exit status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/799656/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 799656] [NEW] package samba-common 2:3.4.7~dfsg-1ubuntu3.6 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1

2011-06-20 Thread Lafon
Public bug reported:

Binary package hint: samba

After download through apt-get it failed to install.

ProblemType: Package
DistroRelease: Ubuntu 10.04
Package: samba-common 2:3.4.7~dfsg-1ubuntu3.6
ProcVersionSignature: Ubuntu 2.6.32-21.32-generic 2.6.32.11+drm33.2
Uname: Linux 2.6.32-21-generic i686
NonfreeKernelModules: hsfengine
Architecture: i386
Date: Mon Jun 20 05:02:54 2011
ErrorMessage: subprocess installed post-installation script returned error exit 
status 1
InstallationMedia: Ubuntu 10.04 LTS "Lucid Lynx" - Release i386 (20100429)
PackageArchitecture: all
SambaServerRegression: No
SourcePackage: samba
Title: package samba-common 2:3.4.7~dfsg-1ubuntu3.6 failed to install/upgrade: 
subprocess installed post-installation script returned error exit status 1
WindowsFailedConnect: Yes

** Affects: samba (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: apport-package i386 lucid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/799656

Title:
  package samba-common 2:3.4.7~dfsg-1ubuntu3.6 failed to
  install/upgrade: subprocess installed post-installation script
  returned error exit status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/799656/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 456279] Re: Text missing in mono application (NMT CSI)

2009-10-30 Thread Michel Lafon-Puyo
I resolved the problem on my Archlinux box by upgrading the xorg Intel
video driver to version 2.9.1

More information here:

https://bugzilla.novell.com/show_bug.cgi?id=549882

-- 
Text missing in mono application (NMT CSI)
https://bugs.launchpad.net/bugs/456279
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 462349] Re: Mono WinForms apps don't show text on menus and button

2009-10-30 Thread Michel Lafon-Puyo
I resolved the problem on my Archlinux box by upgrading the xorg Intel
video driver to version 2.9.1

More information here:

https://bugzilla.novell.com/show_bug.cgi?id=549882

-- 
Mono WinForms apps don't show text on menus and button
https://bugs.launchpad.net/bugs/462349
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs