Hi,
This is a workaround you can use temporarily:
$ wget -O- http://ddebs.ubuntu.com/dbgsym-release-key.asc | sudo apt-
key add -
$ sudo apt update
The key was extended temporarily.
Best,
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
Public bug reported:
The public key used by the debugging symbols repository
/usr/share/keyrings/ubuntu-dbgsym-keyring.gpg from the package ubuntu-
dbgsym-keyring expired.
$ apt policy ubuntu-dbgsym-keyring
ubuntu-dbgsym-keyring:
Installed: 2020.02.11.2
Candidate: 2020.02.11.2
Version
> The problem persists if you upgrade from 16.04.3 directly to 17.04 (
as described https://bugs.launchpad.net/ubuntu/+source/network-
manager/+bug/1658921/comments/23 )
I can confirm this. My upgrade path was xenial -> zesty -> artful and I
had to run "touch
On Tue, 07 Jun 2016 17:31:19 -
Robie Basak <1588...@bugs.launchpad.net> wrote:
> Thank you for taking the time to report this bug and helping to make
> Ubuntu better.
>
> This is certainly worthy of a release note, and I have edited the
> Xenial release notes to highlight this issue.
>
>
** Description changed:
[Impact]
When a user has configured their authorized_keys file with the directive
"from=" to restrict the usage of those keys, if that server is upgraded
to Xenial (or Wily) the user may get locked out.
[Test Case]
* Create 3 containers (client,
** Summary changed:
- authorized_keys using from="hostnamee" no longer work when upgrading to Xenial
+ authorized_keys using from="hostname" no longer work when upgrading to Xenial
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
I'm filing this bug as way to document this change in the behavior and
how to restore trusty's behavior, but also to get feedback from
Foundations if this is something that could be fixed in the distro when
a openssh-server is being upgraded from older versions.
--
You received this bug
Public bug reported:
[Impact]
When a user has configured their authorized_keys file with the directive
"from=" to restrict the usage of those keys, if that server is upgraded
to Xenial (or Wily) the user may get locked out.
[Test Case]
* Create 3 containers (client, trusty, xenial)
$ lxc
** Changed in: ibus (Ubuntu)
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ibus in Ubuntu.
https://bugs.launchpad.net/bugs/1408333
Title:
ibus doesn't restore last keyboard layout selected
ibus has to be started after gnome-settings-daemon, otherwise the later
will override changes in the environment
[...]
gnome-settings-daemon
ibus --daemonize --xim --replace
[...]
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
** Changed in: openldap (Ubuntu Precise)
Assignee: (unassigned) = Felipe Reyes (freyes)
** Changed in: openldap (Ubuntu Trusty)
Assignee: (unassigned) = Felipe Reyes (freyes)
** Changed in: openldap (Ubuntu Utopic)
Assignee: (unassigned) = Felipe Reyes (freyes)
** Changed
Patch for trusty to fix CVE-2013-4449 and CVE-2015-1545
** Patch added: lp1446809_trusty.debdiff
https://bugs.launchpad.net/ubuntu/precise/+source/openldap/+bug/1446809/+attachment/4400527/+files/lp1446809_trusty.debdiff
--
You received this bug notification because you are a member of
Patch for vivid to fix CVE-2013-4449 and CVE-2015-1545
** Patch added: lp1446809_vivid.patch
https://bugs.launchpad.net/ubuntu/precise/+source/openldap/+bug/1446809/+attachment/4400529/+files/lp1446809_vivid.patch
--
You received this bug notification because you are a member of Ubuntu
Patch for utopic to fix CVE-2013-4449 and CVE-2015-1545
** Patch added: lp1446809_utopic.debdiff
https://bugs.launchpad.net/ubuntu/precise/+source/openldap/+bug/1446809/+attachment/4400528/+files/lp1446809_utopic.debdiff
--
You received this bug notification because you are a member of
to
reupload the patch?
Best,
--
Felipe Reyes
Software Sustaining Engineer @ Canonical
STS Engineering Team
# Email: felipe.re...@canonical.com (GPG:0x9B1FFF39)
# Phone: +56 9 7640 7887
# Launchpad: ~freyes | IRC: freyes
--
You received this bug notification because you are a member of Ubuntu
Touch
** Summary changed:
- [SRU] denial of service via an LDAP search query with attrsOnly set to true
(CVE-2012-1164)
+ [SRU] denial of service via an LDAP search query (CVE-2012-1164,
CVE-2013-4449, CVE-2015-1545)
--
You received this bug notification because you are a member of Ubuntu
Touch
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-4449
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-1545
** Attachment removed: lp1446809_precise.debdiff
Here I'm attaching a new version of the patch for precise that includes
fixes for CVE-2012-1164, CVE-2013-4449 and CVE-2015-1545
Pending to add patches to fix CVE-2013-4449 and CVE-2015-1545 in trusty,
utopic, vivid and wily.
** Description changed:
[Impact]
- * slapd in OpenLDAP before
** Description changed:
[Impact]
* slapd in OpenLDAP before 2.4.30 allows remote attackers to cause a
denial of service (assertion failure and daemon exit) via an LDAP search
query with attrsOnly set to true, which causes empty attributes to be
returned.
* Trusty ships 2.4.31
** Description changed:
[Impact]
* slapd in OpenLDAP before 2.4.30 allows remote attackers to cause a
denial of service (assertion failure and daemon exit) via an LDAP search
query with attrsOnly set to true, which causes empty attributes to be
returned.
* Trusty ships 2.4.31
** Patch added: lp1446809_precise.debdiff
https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/1446809/+attachment/4392199/+files/lp1446809_precise.debdiff
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openldap in
** Summary changed:
- denial of service via an LDAP search query with attrsOnly set to true
(CVE-2012-1164)
+ [SRU] denial of service via an LDAP search query with attrsOnly set to true
(CVE-2012-1164)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded
** Tags added: sts
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1439649
Title:
Pacemaker unable to communicate with corosync on restart under lxc
Status in lxc package in
** Tags removed: patch
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openldap in Ubuntu.
https://bugs.launchpad.net/bugs/1446809
Title:
[SRU] denial of service via an LDAP search query with attrsOnly set to
true
I'm seeing this problem in another environment, similar deployment (3
lxc containers)
Apr 20 16:39:26 juju-machine-3-lxc-4 crm_verify[31774]: notice: crm_log_args:
Invoked: crm_verify -V -p
Apr 20 16:39:27 juju-machine-3-lxc-4 cibadmin[31786]: notice: crm_log_args:
Invoked: cibadmin -p -P
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-1164
** Changed in: openldap (Ubuntu)
Assignee: (unassigned) = Felipe Reyes (freyes)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openldap
Public bug reported:
[Impact]
* slapd in OpenLDAP before 2.4.30 allows remote attackers to cause a
denial of service (assertion failure and daemon exit) via an LDAP search
query with attrsOnly set to true, which causes empty attributes to be
returned.
* Trusty ships 2.4.31 which comes with a
Here I'm attaching a debdiff with the backported fix.
** Changed in: util-linux (Ubuntu Utopic)
Assignee: (unassigned) = Felipe Reyes (freyes)
** Summary changed:
- SRU: exfat not detected by blkid
+ [SRU] exfat not detected by blkid
** Patch added: lp_1393542_utopic.debdiff
https
Here I'm attaching a patch built on top of the latest version of the
package (1.1.0~alpha2-0ubuntu3.1)
** Patch removed: utopic_lp1386840.debdiff
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1386840/+attachment/4311145/+files/utopic_lp1386840.debdiff
** Patch added:
** Tags added: cts
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1386840
Title:
[SRU] failure to start a container
Status in lxc package in Ubuntu:
Fix Released
Status in
] failure to start a container
** Changed in: lxc (Ubuntu Trusty)
Assignee: Felipe Reyes (freyes) = (unassigned)
** Patch added: utopic_lp1386840.debdiff
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1386840/+attachment/4311145/+files/utopic_lp1386840.debdiff
** Changed in: lxc (Ubuntu
** Changed in: lxc (Ubuntu Trusty)
Assignee: (unassigned) = Felipe Reyes (freyes)
** Changed in: lxc (Ubuntu Utopic)
Assignee: (unassigned) = Felipe Reyes (freyes)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed
Public bug reported:
Hello,
ibus isn't restoring the last keyboard layout selected when is used in a
stripped down combination of xfce and gnome-settings-daemon. I could isolate
the issue to a minimal Ubuntu installation and detect how ibus behaves
different depending if
*** This bug is a duplicate of bug 1374721 ***
https://bugs.launchpad.net/bugs/1374721
** This bug has been marked a duplicate of bug 1374721
ibus-daemon uses 100% CPU when using gnome-calculator
--
You received this bug notification because you are a member of Ubuntu
Touch seeded
I'm running utopic, after upgrading to lxc-1.1.0~alpha2-0ubuntu3, the
bug went away
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1346815
Title:
lxc-clone causes duplicate
35 matches
Mail list logo