[Bug 1486146] Re: recvfrom SYSCALL infinite loop/deadlock chewing 100% CPU (MSG_PEEK|MSG_WAITALL)
Hi Joseph, I re-created the issue on a new install of Ubuntu 14.04.3 (amd64) running the linux-image-3.19.0-26-generic kernel using the following code: #include stdlib.h #include netinet/ip.h int main(void) { struct sockaddr_in addr = { .sin_family = AF_INET, .sin_port = htons(1234), .sin_addr = { INADDR_ANY } }; int conn; char buf[16]; int s = socket(AF_INET, SOCK_STREAM, 0); bind(s, (void *)addr, sizeof addr); listen(s, 1); conn = accept(s, NULL, 0); recv(conn, buf, sizeof buf, MSG_PEEK|MSG_WAITALL); } $ gcc x.c $ ./a.out $ nc 127.0.0.1 1234 1234enter -- 'a.out' consumes 100% CPU After downloading and installing kernel packages from http://kernel.ubuntu.com/~jsalisbury/lp1486146/ I rebooted, and re-ran the test as above, this time 'a.out' does not consume 100% CPU any more, so the bug seems fixed at least in this simple test case using the replacement kernel. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1486146 Title: recvfrom SYSCALL infinite loop/deadlock chewing 100% CPU (MSG_PEEK|MSG_WAITALL) To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1486146/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1324438] [NEW] libvrb0 libvrb0-dev needs-packaging Trusty
Public bug reported: Trusty 14.04 does not contain libvrb0 or libvrb0-dev, which were available in previous releases of Ubuntu, please needs-packaging. ** Affects: vrb (Ubuntu) Importance: Undecided Status: New ** Tags: libvrb0-dev needs-packaging trusty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1324438 Title: libvrb0 libvrb0-dev needs-packaging Trusty To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/vrb/+bug/1324438/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1063613] Re: array type handling bug in libecpg.so.6.3, confirmed, patch attached
I have tested the proposed postgresql-9.1 packages and can confirm that the fix works in my test case, and in my real case which initially triggered by bug report. Basically: tested, fix confirmed. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1063613 Title: array type handling bug in libecpg.so.6.3, confirmed, patch attached To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/postgresql-9.1/+bug/1063613/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1063613] Re: array type handling bug in libecpg.so.6.3, confirmed, patch attached
I'm trying to test the proposed postgresql-9.1 package, however, I'm finding it impossible to get apt to download the correct achive. I have followed all the instructions below, and here's a quick grep from apt-get update: root@ubuntu:/home/dan# apt-get update | grep proposed Ign http://gb.archive.ubuntu.com precise-proposed InRelease Hit http://gb.archive.ubuntu.com precise-proposed Release.gpg Hit http://gb.archive.ubuntu.com precise-proposed Release Hit http://gb.archive.ubuntu.com precise-proposed/main Sources Hit http://gb.archive.ubuntu.com precise-proposed/multiverse Sources Hit http://gb.archive.ubuntu.com precise-proposed/universe Sources Hit http://gb.archive.ubuntu.com precise-proposed/main amd64 Packages Hit http://gb.archive.ubuntu.com precise-proposed/multiverse amd64 Packages Hit http://gb.archive.ubuntu.com precise-proposed/universe amd64 Packages Hit http://gb.archive.ubuntu.com precise-proposed/main i386 Packages Hit http://gb.archive.ubuntu.com precise-proposed/multiverse i386 Packages Hit http://gb.archive.ubuntu.com precise-proposed/universe i386 Packages Hit http://gb.archive.ubuntu.com precise-proposed/main TranslationIndex Hit http://gb.archive.ubuntu.com precise-proposed/multiverse TranslationIndex Hit http://gb.archive.ubuntu.com precise-proposed/universe TranslationIndex Hit http://gb.archive.ubuntu.com precise-proposed/main Translation-en_GB Hit http://gb.archive.ubuntu.com precise-proposed/main Translation-en Hit http://gb.archive.ubuntu.com precise-proposed/multiverse Translation-en_GB Hit http://gb.archive.ubuntu.com precise-proposed/multiverse Translation-en Hit http://gb.archive.ubuntu.com precise-proposed/universe Translation-en_GB Hit http://gb.archive.ubuntu.com precise-proposed/universe Translation-en root@ubuntu:/home/dan# apt-get install postgresql-9.1/precise-proposed libecpg6/precise-proposed Reading package lists... Done Building dependency tree Reading state information... Done E: Release âprecise-proposedâ for âpostgresql-9.1â was not found E: Release âprecise-proposedâ for âlibecpg6â was not found Is the gb.archive.ubuntu.com repository not suitable? What am I doing wrong here? Dan... -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1063613 Title: array type handling bug in libecpg.so.6.3, confirmed, patch attached To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/postgresql-9.1/+bug/1063613/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1063613] [NEW] array type handling bug in libecpg.so.6.3, confirmed, patch attached
Public bug reported: I found a bug in libecpg.so.6.3, which according to Michael Meskes was introduced in the postgresql 9.0 source tree. I have included a test application which works fine on Postgresql 8.4 (libecpg.so.6.1), but fails using Postgresql 9.1 (libecpg.so.6.3). After confirming the bug with Michael, he came up with this patch. Can it be added to the Ubuntu package sources please?... commit 4f6469e55c8bf8b015fe571313c5922a869b4636 Author: Michael Meskes mes...@debian.org Date: Fri Oct 5 16:37:45 2012 +0200 Fixed test for array boundary. Instead of continuing if the next character is not an array boundary get_data() used to continue only on finding a boundary so it was not able to read any element after the first. diff --git a/src/interfaces/ecpg/ecpglib/data.c b/src/interfaces/ecpg/ecpglib/data.c index db97503..dcccd92 100644 --- a/src/interfaces/ecpg/ecpglib/data.c +++ b/src/interfaces/ecpg/ecpglib/data.c @@ -422,6 +422,7 @@ ecpg_get_data(const PGresult *results, int act_tuple, int act_field, int lineno, ecpg_raise(lineno, ECPG_CONVERT_BOOL, ECPG_SQLSTATE_DATATYPE_MISMATCH, NULL); + pval++; break; } else if (pval[0] == 't' pval[1] == '\0') @@ -434,6 +435,7 @@ ecpg_get_data(const PGresult *results, int act_tuple, int act_field, int lineno, ecpg_raise(lineno, ECPG_CONVERT_BOOL, ECPG_SQLSTATE_DATATYPE_MISMATCH, NULL); + pval++; break; } else if (pval[0] == '\0' PQgetisnull(results, act_tuple, act_field)) @@ -777,7 +779,7 @@ ecpg_get_data(const PGresult *results, int act_tuple, int act_field, int lineno, ++pval; } } - } while (*pval != '\0' array_boundary(isarray, *pval)); + } while (*pval != '\0' !array_boundary(isarray, *pval)); return (true); } ** Affects: postgresql-9.1 (Ubuntu) Importance: Undecided Status: New ** Tags: array ecpg -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1063613 Title: array type handling bug in libecpg.so.6.3, confirmed, patch attached To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/postgresql-9.1/+bug/1063613/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1063613] Re: array type handling bug in libecpg.so.6.3, confirmed, patch attached
** Attachment added: test case to reproduce bug https://bugs.launchpad.net/bugs/1063613/+attachment/3385281/+files/ecpg_array_test.tar.gz -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1063613 Title: array type handling bug in libecpg.so.6.3, confirmed, patch attached To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/postgresql-9.1/+bug/1063613/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1063613] Re: array type handling bug in libecpg.so.6.3, confirmed, patch attached
Just got his response from Michael... Does this fix have a tracking number or code of some sort which I can inform the Ubuntu package maintainers? I want to get the It was git commit 856ce0fb563a630ddd07dfad8cb4d8eb1d601b77 in the 9.1 branch. fix into the Ubuntu 12.04 postgressql-9.1 amd64 package as soon as possible. Feel free to point Martin to me, if there are questions. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1063613 Title: array type handling bug in libecpg.so.6.3, confirmed, patch attached To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/postgresql-9.1/+bug/1063613/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1040588] [NEW] squid3.HEAD (20120823-r12295) WARNING: ICAP Max-Connections limit exceeded bug
Public bug reported: Not sure if this is the right place. I've been trying to find the correct bug tracker for hours. This was the only place I could see that was at all relevant. I configured squid3.HEAD-20120823-r12295 on an up to date Ubuntu 12.04.1 LTS (64 bit) machine like so: ./configure --build=x86_64-linux-gnu --prefix=/usr --includedir=/include --mandir=/share/man --infodir=/share/info --sysconfdir=/etc --localstatedir=/var --libexecdir=/lib/squid3 --disable-maintainer-mode --disable-dependency-tracking --disable-silent-rules --srcdir=. --datadir=/usr/share/squid3 --sysconfdir=/etc/squid3 --mandir=/usr/share/man --with-cppunit-basedir=/usr --enable-inline --enable-async-io=8 --enable-storeio=ufs,aufs,diskd --enable-removal- policies=lru,heap --enable-delay-pools --enable-cache-digests --enable- underscores --enable-icap-client --enable-ssl --enable-ssl-crtd --enable-follow-x-forwarded-for --enable-basic-auth- helpers=LDAP,MSNT,NCSA,PAM,SASL,SMB,YP,DB,POP3,getpwnam,squid_radius_auth ,multi-domain-NTLM --enable-ntlm-auth-helpers=smb_lm, --enable-digest- auth-helpers=ldap,password --enable-negotiate-auth- helpers=squid_kerb_auth --enable-external-acl- helpers=ip_user,ldap_group,session,unix_group,wbinfo_group --enable-arp- acl --enable-esi --enable-zph-qos --disable-translation --with- logdir=/var/log/squid3 --with-pidfile=/var/run/squid3.pid --with- filedescriptors=65536 --with-large-files --with-default-user=proxy --enable-linux-netfilter build_alias=x86_64-linux-gnu I configured the squid.conf like so: acl localnet src 10.0.0.0/8 # RFC1918 possible internal network acl localnet src 172.16.0.0/12 # RFC1918 possible internal network acl localnet src 192.168.0.0/16 # RFC1918 possible internal network acl localnet src fc00::/7 # RFC 4193 local private network range acl localnet src fe80::/10 # RFC 4291 link-local (directly plugged) machines acl SSL_ports port 443 acl Safe_ports port 80 # http acl Safe_ports port 21 # ftp acl Safe_ports port 443 # https acl Safe_ports port 70 # gopher acl Safe_ports port 210 # wais acl Safe_ports port 1025-65535 # unregistered ports acl Safe_ports port 280 # http-mgmt acl Safe_ports port 488 # gss-http acl Safe_ports port 591 # filemaker acl Safe_ports port 777 # multiling http acl CONNECT method CONNECT http_access deny manager http_access allow localnet http_access allow localhost http_access deny all http_port 0.0.0.0:8080 host_verify_strict off cache_mem 64 MB memory_cache_shared off coredump_dir /var/cache/squid refresh_pattern ^ftp: 144020% 10080 refresh_pattern ^gopher:14400% 1440 refresh_pattern -i (/cgi-bin/|\?) 0 0% 0 refresh_pattern . 0 20% 4320 shutdown_lifetime 1 seconds always_direct allow all icap_enable on icap_connect_timeout 10 seconds icap_io_timeout 10 seconds icap_service_failure_limit 100 in 1 seconds icap_service_revival_delay 20 icap_preview_enable on icap_206_enable on icap_persistent_connections on adaptation_send_client_ip on adaptation_send_username on icap_client_username_header X-Client-Username icap_client_username_encode off icap_service service_blocker reqmod_precache icap://myicapserver:1344/reqmod bypass=off ipv6=off adaptation_access service_blocker allow all icap_retry allow all icap_retry_limit 1 allow_underscore on dns_defnames on hosts_file /etc/hosts dns_v4_first on memory_pools_limit 32 MB forwarded_for off connect_retries 3 workers 1 unlinkd_program /usr/lib/squid3/unlinkd logfile_daemon /usr/lib/squid3/log_file_daemon I need this version as it has new features I require and quickly ran into a problem with the ICAP support. Running tcpdump, I can see regular OPTIONS request and responses from squid to the ICAP server, but squid never attempts to issue a REQMOD request, I get ICAP protocol error in the browser or it simply hangs there, and the cache.log shows 2012/08/23 11:35:08 kid1| essential ICAP service is down after an options fetch failure: icap://myicapserver:1344/reqmod [down,!opt] 2012/08/23 11:35:09 kid1| suspending ICAP service for too many failures 2012/08/23 11:35:38 kid1| essential ICAP service is up: icap://myicapserver:1344/reqmod [up] 2012/08/23 11:35:52 kid1| WARNING: ICAP Max-Connections limit exceeded for service icap://myicapserver:1344/reqmod. Open connections now: 1, including 0 idle persistent connections. There are only a maximum of 2 or 3 connections open to the ICAP server at any given time, so the message Open connections now: 1, is simply wrong. This problem renders the ICAP adaption support useless. If this is the wrong place to report the bug, please advise. ** Affects: squid3 (Ubuntu) Importance: Undecided Status: New ** Description changed: Not sure if this is the right place. I've been trying to find the correct bug tracker for hours. This was the only place I could see that was at
[Bug 1040588] [NEW] squid3.HEAD (20120823-r12295) WARNING: ICAP Max-Connections limit exceeded bug
Public bug reported: Not sure if this is the right place. I've been trying to find the correct bug tracker for hours. This was the only place I could see that was at all relevant. I configured squid3.HEAD-20120823-r12295 on an up to date Ubuntu 12.04.1 LTS (64 bit) machine like so: ./configure --build=x86_64-linux-gnu --prefix=/usr --includedir=/include --mandir=/share/man --infodir=/share/info --sysconfdir=/etc --localstatedir=/var --libexecdir=/lib/squid3 --disable-maintainer-mode --disable-dependency-tracking --disable-silent-rules --srcdir=. --datadir=/usr/share/squid3 --sysconfdir=/etc/squid3 --mandir=/usr/share/man --with-cppunit-basedir=/usr --enable-inline --enable-async-io=8 --enable-storeio=ufs,aufs,diskd --enable-removal- policies=lru,heap --enable-delay-pools --enable-cache-digests --enable- underscores --enable-icap-client --enable-ssl --enable-ssl-crtd --enable-follow-x-forwarded-for --enable-basic-auth- helpers=LDAP,MSNT,NCSA,PAM,SASL,SMB,YP,DB,POP3,getpwnam,squid_radius_auth ,multi-domain-NTLM --enable-ntlm-auth-helpers=smb_lm, --enable-digest- auth-helpers=ldap,password --enable-negotiate-auth- helpers=squid_kerb_auth --enable-external-acl- helpers=ip_user,ldap_group,session,unix_group,wbinfo_group --enable-arp- acl --enable-esi --enable-zph-qos --disable-translation --with- logdir=/var/log/squid3 --with-pidfile=/var/run/squid3.pid --with- filedescriptors=65536 --with-large-files --with-default-user=proxy --enable-linux-netfilter build_alias=x86_64-linux-gnu I configured the squid.conf like so: acl localnet src 10.0.0.0/8 # RFC1918 possible internal network acl localnet src 172.16.0.0/12 # RFC1918 possible internal network acl localnet src 192.168.0.0/16 # RFC1918 possible internal network acl localnet src fc00::/7 # RFC 4193 local private network range acl localnet src fe80::/10 # RFC 4291 link-local (directly plugged) machines acl SSL_ports port 443 acl Safe_ports port 80 # http acl Safe_ports port 21 # ftp acl Safe_ports port 443 # https acl Safe_ports port 70 # gopher acl Safe_ports port 210 # wais acl Safe_ports port 1025-65535 # unregistered ports acl Safe_ports port 280 # http-mgmt acl Safe_ports port 488 # gss-http acl Safe_ports port 591 # filemaker acl Safe_ports port 777 # multiling http acl CONNECT method CONNECT http_access deny manager http_access allow localnet http_access allow localhost http_access deny all http_port 0.0.0.0:8080 host_verify_strict off cache_mem 64 MB memory_cache_shared off coredump_dir /var/cache/squid refresh_pattern ^ftp: 144020% 10080 refresh_pattern ^gopher:14400% 1440 refresh_pattern -i (/cgi-bin/|\?) 0 0% 0 refresh_pattern . 0 20% 4320 shutdown_lifetime 1 seconds always_direct allow all icap_enable on icap_connect_timeout 10 seconds icap_io_timeout 10 seconds icap_service_failure_limit 100 in 1 seconds icap_service_revival_delay 20 icap_preview_enable on icap_206_enable on icap_persistent_connections on adaptation_send_client_ip on adaptation_send_username on icap_client_username_header X-Client-Username icap_client_username_encode off icap_service service_blocker reqmod_precache icap://myicapserver:1344/reqmod bypass=off ipv6=off adaptation_access service_blocker allow all icap_retry allow all icap_retry_limit 1 allow_underscore on dns_defnames on hosts_file /etc/hosts dns_v4_first on memory_pools_limit 32 MB forwarded_for off connect_retries 3 workers 1 unlinkd_program /usr/lib/squid3/unlinkd logfile_daemon /usr/lib/squid3/log_file_daemon I need this version as it has new features I require and quickly ran into a problem with the ICAP support. Running tcpdump, I can see regular OPTIONS request and responses from squid to the ICAP server, but squid never attempts to issue a REQMOD request, I get ICAP protocol error in the browser or it simply hangs there, and the cache.log shows 2012/08/23 11:35:08 kid1| essential ICAP service is down after an options fetch failure: icap://myicapserver:1344/reqmod [down,!opt] 2012/08/23 11:35:09 kid1| suspending ICAP service for too many failures 2012/08/23 11:35:38 kid1| essential ICAP service is up: icap://myicapserver:1344/reqmod [up] 2012/08/23 11:35:52 kid1| WARNING: ICAP Max-Connections limit exceeded for service icap://myicapserver:1344/reqmod. Open connections now: 1, including 0 idle persistent connections. There are only a maximum of 2 or 3 connections open to the ICAP server at any given time, so the message Open connections now: 1, is simply wrong. This problem renders the ICAP adaption support useless. If this is the wrong place to report the bug, please advise. ** Affects: squid3 (Ubuntu) Importance: Undecided Status: New ** Description changed: Not sure if this is the right place. I've been trying to find the correct bug tracker for hours. This was the only place I could see that was at
[Bug 723840] Re: krb5-1.8 fails to verify MS PAC Checksum when AES 256 is used
I can confirm that compiling and using the new MIT Kerberos 1.8.3 libs fixes the problem I described. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to krb5 in ubuntu. https://bugs.launchpad.net/bugs/723840 Title: krb5-1.8 fails to verify MS PAC Checksum when AES 256 is used -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 723840] Re: krb5-1.8 fails to verify MS PAC Checksum when AES 256 is used
I can confirm that compiling and using the new MIT Kerberos 1.8.3 libs fixes the problem I described. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/723840 Title: krb5-1.8 fails to verify MS PAC Checksum when AES 256 is used -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 723840] [NEW] krb5-1.8 fails to verify MS PAC Checksum when AES 256 is used
Public bug reported: Binary package hint: libkrb5-3 libkrb5-3 in Lucid does not work properly when mediating between a Windows 7 client and a 2008R2 KDC after applying MS hotfix KB2425227. The bug has been reported previously here: http://mailman.mit.edu/pipermail/krbdev/2010-July/009148.html And here: http://www.mail-archive.com/squid-users@squid-cache.org/msg75789.html However, it's only since the MS hotfix that it has become a problem for us. Basically, the bug has been fixed in libkrb5-3 version 1.8.3, so all you have to do is update the package. I'm guessing you're going to get a lot more bug reports on this, trust MS to keep changing the goal posts and making our jobs harder. ** Affects: krb5 (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to krb5 in ubuntu. https://bugs.launchpad.net/bugs/723840 Title: krb5-1.8 fails to verify MS PAC Checksum when AES 256 is used -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 723840] [NEW] krb5-1.8 fails to verify MS PAC Checksum when AES 256 is used
Public bug reported: Binary package hint: libkrb5-3 libkrb5-3 in Lucid does not work properly when mediating between a Windows 7 client and a 2008R2 KDC after applying MS hotfix KB2425227. The bug has been reported previously here: http://mailman.mit.edu/pipermail/krbdev/2010-July/009148.html And here: http://www.mail-archive.com/squid-users@squid-cache.org/msg75789.html However, it's only since the MS hotfix that it has become a problem for us. Basically, the bug has been fixed in libkrb5-3 version 1.8.3, so all you have to do is update the package. I'm guessing you're going to get a lot more bug reports on this, trust MS to keep changing the goal posts and making our jobs harder. ** Affects: krb5 (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/723840 Title: krb5-1.8 fails to verify MS PAC Checksum when AES 256 is used -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 475546] Re: Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1
Erm nobody doing anything to get these fixes merged into the upstream? Anything? Anybody? :-/ -- Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1 https://bugs.launchpad.net/bugs/475546 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to krb5 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 475546] Re: Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1
Erm nobody doing anything to get these fixes merged into the upstream? Anything? Anybody? :-/ -- Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1 https://bugs.launchpad.net/bugs/475546 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 475546] Re: Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1
Still low priproty? I'm having to use custom build libs which override the libkrb53 package, which is not optimal. Any idea when these bug fixes will be merged? -- Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1 https://bugs.launchpad.net/bugs/475546 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to krb5 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 475546] Re: Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1
Still low priproty? I'm having to use custom build libs which override the libkrb53 package, which is not optimal. Any idea when these bug fixes will be merged? -- Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1 https://bugs.launchpad.net/bugs/475546 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 519781] [NEW] Strange SEGVs all over the place after upgrade to 2.6.24-27-server (Hardy)
Public bug reported: After dist-upgrading some of our customers servers which run Hardy 8.04 LTS server 32 bit, we have had sporadic SEGVs in random services (cron, sshd etc). I'm pretty sure it's something to do with the kernel because: a) we've run memtest and they came up clean b) otherwise they have been running fine for months c) There seems no pattern to which services die with segv's. Here's a snippit from dmesg from one of the servers: [3013754.735517] cron[16609]: segfault at fef6403a eip fef6403a esp bfd0e0ec error 14 [3013754.768912] cron[16610]: segfault at fef6403a eip fef6403a esp bfd0e0ec error 14 [3013754.768969] cron[16612]: segfault at fef6403a eip fef6403a esp bfd0e0ec error 14 [3013754.810724] cron[16611]: segfault at fef6403a eip fef6403a esp bfd0e0ec error 14 [3013754.810851] cron[16615]: segfault at fef6403a eip fef6403a esp bfd0e0ec error 14 [3013763.766067] postgres[17048]: segfault at 400c eip b7a2dbc6 esp bfd5eaa0 error 4 [3013763.766479] postgres[21889]: segfault at 400c eip b7a2dbc6 esp bfd5e5b0 error 4 [3013763.766496] postgres[21890]: segfault at 400c eip b7a2dbc6 esp bfd5e5f0 error 4 [3013763.766906] postgres[21892]: segfault at 400c eip b7a2dbc6 esp bfd5e670 error 4 [3013763.767015] postgres[21891]: segfault at 400c eip b7a2dbc6 esp bfd5e680 error 4 [3013763.770930] postgres[17049]: segfault at 400c eip b7a2dbc6 esp bfd5ea50 error 4 [3014526.736920] printk: 1 messages suppressed. [3014526.736925] sshd[4923]: segfault at 400c eip b7a4fbc6 esp bfca7d80 error 4 Looks like maybe some upstream changes have gone seriously wrong. ** Affects: linux (Ubuntu) Importance: Undecided Status: New -- Strange SEGVs all over the place after upgrade to 2.6.24-27-server (Hardy) https://bugs.launchpad.net/bugs/519781 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 475546] Re: Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1
I've found and attempted a fix for more memory leaks in libkrb53, here's a patch (attached) that fixes them for me when patched against the krb5-1.6.4-beta1 relase available from MIT. I urge you to test this patch (it may have undesirable side effects I'm unaware of) and if it's good then merge it into the Ubuntu release of MIT kerberos. Reards, Dan... ** Attachment added: krb5-1.6.4-beta1.patch http://launchpadlibrarian.net/35578086/krb5-1.6.4-beta1.patch -- Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1 https://bugs.launchpad.net/bugs/475546 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to krb5 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 475546] Re: Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1
I've found and attempted a fix for more memory leaks in libkrb53, here's a patch (attached) that fixes them for me when patched against the krb5-1.6.4-beta1 relase available from MIT. I urge you to test this patch (it may have undesirable side effects I'm unaware of) and if it's good then merge it into the Ubuntu release of MIT kerberos. Reards, Dan... ** Attachment added: krb5-1.6.4-beta1.patch http://launchpadlibrarian.net/35578086/krb5-1.6.4-beta1.patch -- Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1 https://bugs.launchpad.net/bugs/475546 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 475546] Re: Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1
Why is this seen as low priotiry, it's causing no end of problems for some of our servers running out of memory, I have to restart the effected daemons twice a day, which is a pretty ugly, I have confirmed the patch I submitted from the krb5...@mit.edu mailing list does work. All you have to do is apply this patch: --- ./src/lib/krb5/rcache/rc_none.c 2004-08-04 07:58:17.0 +0100 +++ ./src/lib/krb5/rcache/rc_none.c 2009-11-09 09:14:43.0 + @@ -43,11 +43,17 @@ return 0; } #define krb5_rc_none_recover krb5_rc_none_noargs -#define krb5_rc_none_destroy krb5_rc_none_noargs -#define krb5_rc_none_close krb5_rc_none_noargs #define krb5_rc_none_expunge krb5_rc_none_noargs static krb5_error_code KRB5_CALLCONV +krb5_rc_none_close(krb5_context ctx, krb5_rcache rc) +{ +free (rc); +return 0; +} +#define krb5_rc_none_destroykrb5_rc_none_close + +static krb5_error_code KRB5_CALLCONV krb5_rc_none_store(krb5_context ctx, krb5_rcache rc, krb5_donot_replay *r) { return 0; I tried to make a new libkrb53 package myself, but there are lots of interdependencies which mean I would have to remake lots of other packages. Please apply this patch and update the official Hardy repository ASAP. -- Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1 https://bugs.launchpad.net/bugs/475546 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to krb5 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 475546] Re: Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1
Why is this seen as low priotiry, it's causing no end of problems for some of our servers running out of memory, I have to restart the effected daemons twice a day, which is a pretty ugly, I have confirmed the patch I submitted from the krb5...@mit.edu mailing list does work. All you have to do is apply this patch: --- ./src/lib/krb5/rcache/rc_none.c 2004-08-04 07:58:17.0 +0100 +++ ./src/lib/krb5/rcache/rc_none.c 2009-11-09 09:14:43.0 + @@ -43,11 +43,17 @@ return 0; } #define krb5_rc_none_recover krb5_rc_none_noargs -#define krb5_rc_none_destroy krb5_rc_none_noargs -#define krb5_rc_none_close krb5_rc_none_noargs #define krb5_rc_none_expunge krb5_rc_none_noargs static krb5_error_code KRB5_CALLCONV +krb5_rc_none_close(krb5_context ctx, krb5_rcache rc) +{ +free (rc); +return 0; +} +#define krb5_rc_none_destroykrb5_rc_none_close + +static krb5_error_code KRB5_CALLCONV krb5_rc_none_store(krb5_context ctx, krb5_rcache rc, krb5_donot_replay *r) { return 0; I tried to make a new libkrb53 package myself, but there are lots of interdependencies which mean I would have to remake lots of other packages. Please apply this patch and update the official Hardy repository ASAP. -- Memory leaks in version 1.6.dfsg.3~beta1-2ubuntu1.1 https://bugs.launchpad.net/bugs/475546 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 434536] [NEW] ca-certificates_20090701_all.deb does not have all Entrust root CA's
Public bug reported: Binary package hint: ca-certificates ca-certificates_20090701_all.deb does not have all Entrust root CA's For example, the following sites are not able to be validated: https://www.savingsbondsdirect.gov https://fire.irs.gov Regards, Dan... ** Affects: ca-certificates (Ubuntu) Importance: Undecided Status: New -- ca-certificates_20090701_all.deb does not have all Entrust root CA's https://bugs.launchpad.net/bugs/434536 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 430644] Re: Please include http://svrsecure-g2-aia.verisign.com/SVRSecureG2.cer
** Attachment added: SVRSecureG2.crt http://launchpadlibrarian.net/31896801/SVRSecureG2.crt -- Please include http://svrsecure-g2-aia.verisign.com/SVRSecureG2.cer https://bugs.launchpad.net/bugs/430644 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 430644] [NEW] Please include http://svrsecure-g2-aia.verisign.com/SVRSecureG2.cer
Public bug reported: Binary package hint: ca-certificates The ca-certificates package is a bit of a problem. It doesn't conain many trusted ca's that it should, for instance, here's a Verisign cert that should be included: http://svrsecure-g2-aia.verisign.com/SVRSecureG2.cer (have to convert it to a .crt from a .cer which I've attached.) Also, you need to sync the latest package with all Ubuntu distro's, e.g. Hardy, and not just keep updating the Jaunty/Karmic distros. Dan... ** Affects: ca-certificates (Ubuntu) Importance: Undecided Status: New -- Please include http://svrsecure-g2-aia.verisign.com/SVRSecureG2.cer https://bugs.launchpad.net/bugs/430644 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs