[Bug 1404599] [NEW] libpam-mount installs pkgconfig in /lib
Public bug reported: In vivid (and maybe other releases) libpam-mount installs the file /lib/pkgconfig/libcryptmount.pc That's strange for two reasons: 1) pkg-config files should not be installed by non-'-dev' packages 2) pkg-config files won't be found in /lib/pkgconfig Note for example: (vivid-amd64)desrt@spadina:~$ pkg-config --libs libcryptmount Package libcryptmount was not found in the pkg-config search path. Perhaps you should add the directory containing `libcryptmount.pc' to the PKG_CONFIG_PATH environment variable No package 'libcryptmount' found but forcing it will demonstrate that the package is installed: (vivid-amd64)desrt@spadina:~$ PKG_CONFIG_PATH=/lib/pkgconfig pkg-config --libs libcryptmount -lcryptmount ** Affects: libpam-mount (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to libpam-mount in Ubuntu. https://bugs.launchpad.net/bugs/1404599 Title: libpam-mount installs pkgconfig in /lib To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libpam-mount/+bug/1404599/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1319100] Re: qemu-arm-static bug in signal handling avoids using mono
** Changed in: qemu-kvm (Debian) Status: Unknown => Confirmed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu-kvm in Ubuntu. https://bugs.launchpad.net/bugs/1319100 Title: qemu-arm-static bug in signal handling avoids using mono To manage notifications about this bug go to: https://bugs.launchpad.net/qemu/+bug/1319100/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1395098] Re: [Utopic] OpenLDAP version is outdated
** Changed in: openldap (Ubuntu) Status: Confirmed => In Progress ** Changed in: openldap (Ubuntu) Assignee: (unassigned) => Ryan Tandy (rtandy) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1395098 Title: [Utopic] OpenLDAP version is outdated To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/1395098/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1319100] Re: qemu-arm-static bug in signal handling avoids using mono
** Project changed: qemu => qemu-kvm (Ubuntu) ** Also affects: qemu Importance: Undecided Status: New ** Bug watch added: Debian Bug tracker #748043 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=748043 ** Also affects: qemu-kvm (Debian) via http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=748043 Importance: Unknown Status: Unknown -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu-kvm in Ubuntu. https://bugs.launchpad.net/bugs/1319100 Title: qemu-arm-static bug in signal handling avoids using mono To manage notifications about this bug go to: https://bugs.launchpad.net/qemu/+bug/1319100/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1319100] Re: qemu-arm-static bug in signal handling avoids using mono
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: qemu-kvm (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu-kvm in Ubuntu. https://bugs.launchpad.net/bugs/1319100 Title: qemu-arm-static bug in signal handling avoids using mono To manage notifications about this bug go to: https://bugs.launchpad.net/qemu/+bug/1319100/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1319100] [NEW] qemu-arm-static bug in signal handling avoids using mono
You have been subscribed to a public bug: Note, this bug is already reported to debian, but it seems to also affect the upstream code. https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=748043 running mono in a chroot environment with qemu-user-static is not posible because at least one signal used during termination of mono is routed to the host. This can be reproduced by: debootstrap --include=mono-runtime --foreign --arch=armel "wheezy" "mono-test" "http://ftp.de.debian.org//debian"; cp /usr/bin/qemu-arm-static mono-test/usr/bin mount -t proc none mono-test/proc mount -o bind /dev mono-test/dev mount -o bind /sys mono-test/sys chroot mono-test ../debootstrap/debootstrap --second-stage exit mount -t proc none mono-test/proc mount -o bind /sys mono-test/sys chroot mono-test QEMU_STRACE=1 /usr/bin/mono /usr/lib/mono/4.0/gacutil.exe This will block on a futex: --8<-- 18663 sched_yield(0,0,2582980,0,0,2582928) = 0 18663 clock_gettime(1,-150996384,2,1,2585016,2585600) = 0 18663 tgkill(18663,18664,30,18664,30,-161951744) = 0 18663 futex(0x00293774,FUTEX_PRIVATE_FLAG|FUTEX_WAIT,0,NULL,NULL,0) --8<-- If you use mono within strace on a native x86 box you can see, that signals between threads are used during termination: strace -f -o log.txt /usr/bin/mono /usr/lib/mono/4.0/gacutil.exe --8<-- 14075 sched_yield() = 0 14075 tgkill(14075, 14083, SIGPWR) = 0 14075 futex(0x983f00, FUTEX_WAIT_PRIVATE, 0, NULL 14083 <... futex resumed> ) = ? ERESTARTSYS (To be restarted) 14083 --- SIGPWR (Power failure) @ 0 (0) --- 14083 futex(0x983f00, FUTEX_WAKE_PRIVATE, 1) = 1 14075 <... futex resumed> ) = 0 14083 rt_sigsuspend(~[INT QUIT ABRT TERM XCPU RTMIN RT_1] 14075 futex(0x94d9a4, FUTEX_CMP_REQUEUE_PRIVATE, 1, 2147483647, 0x94da20, 24) = 3 14078 <... futex resumed> ) = 0 14078 futex(0x94da20, FUTEX_WAKE_PRIVATE, 1) = 1 14077 <... futex resumed> ) = 0 14075 futex(0x94d9a4, FUTEX_CMP_REQUEUE_PRIVATE, 1, 2147483647, 0x94da20, 26 --8<-- This also blocks the installation of libnunit2.6-cil within a armel chroot, because it uses mono in its postinst script. E.g. (/usr/bin/mono /usr/share/mono/MonoGetAssemblyName.exe /usr/lib/cli/nunit.core-2.6/nunit.core.dll) Obviously the same as described in: http://lists.opensuse.org/opensuse-arm/2011-12/msg0.html is happening here. There is an openSuSE patch against qemu: https://build.opensuse.org/package/view_file/Virtualization:Qemu/qemu/0002-XXX-work-around-SA_RESTART-race-wit.patch?expand=1 This patch also applies against qemu from backports-wheezy and resolves this issue. As it seems, that this issue is not Debian specific i will also report it to the qemu project and reference this bug report. ** Affects: qemu-kvm (Ubuntu) Importance: Undecided Status: New ** Tags: trusty -- qemu-arm-static bug in signal handling avoids using mono https://bugs.launchpad.net/bugs/1319100 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu-kvm in Ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1259939] Re: ssh -g has no effect if master socket already open
** Changed in: openssh (Debian) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openssh in Ubuntu. https://bugs.launchpad.net/bugs/1259939 Title: ssh -g has no effect if master socket already open To manage notifications about this bug go to: https://bugs.launchpad.net/openssh/+bug/1259939/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1039420] Re: NTP security vulnerability because not using authentication by default
Has Ubuntu considered using tlsdate instead of ntp? I think it's the only working secure solution right now. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to ntp in Ubuntu. https://bugs.launchpad.net/bugs/1039420 Title: NTP security vulnerability because not using authentication by default To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1039420/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs