[Touch-packages] [Bug 1987583] [NEW] package libgbm1 21.2.6-0ubuntu0.1~20.04.2 [modified: usr/lib/aarch64-linux-gnu/libgbm.so.1.0.0] failed to install/upgrade: unable to make backup link of './usr/lib

2022-08-24 Thread Darrin W. Root
: Invalid cross-device link ExtraDebuggingInterest: Yes, if not too technical GraphicsCard: Lspci-vt: -+-[0002:20]---00.0-[21]00.0 Sandisk Corp WD Blue SN570 NVMe SSD \-[:00]- ProcKernelCmdLine: storagemedia=mtd androidboot.storagemedia=mtd androidboot.mode=normal root=UUID=ea5041c4-93df

[Touch-packages] [Bug 1794629] Re: CVE-2018-15473 - User enumeration vulnerability

2019-04-06 Thread root
@Vital & Seth Thanks for the clarification, so qualys is the culprit!, such a good security company providing false reports without actually doing full scan, and now I am looking for a script to demonstrate this vulnerability fix, any good script? Will this do..?

[Touch-packages] [Bug 1794629] Re: CVE-2018-15473 - User enumeration vulnerability

2019-04-05 Thread root
@set, That's fine, but scanned Qualys report suggests to install openssh >7.8 to fix this bug!, not sure where is the issue, PFA for sample qualys report, do you know how to change the openssh version and hide OS version without compiling?, any SSHD_options? let me know. Thanks ** Attachment

[Touch-packages] [Bug 1794629] Re: CVE-2018-15473 - User enumeration vulnerability

2019-03-31 Thread root
@Seth, if the update released after November 6th 2018, then why I am getting 7.6p1 version even when i install with the latest ISO distro from Feb 10 here ?. http://cdimage.ubuntu.com/releases/18.04.2/release/ubuntu-18.04.2 -server-amd64.iso The above ISO is from Feb 2019 and it should be

[Touch-packages] [Bug 1794629] Re: CVE-2018-15473 - User enumeration vulnerability

2019-03-29 Thread root
@seth, apt-upgrade doesnt update even in 18.04, I had to compile new ver 7.9p1 and replace the sshd bin file..!, don't know why it is still not pushed to the main repo!. -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to

[Touch-packages] [Bug 1794629] Re: CVE-2018-15473 - User enumeration vulnerability

2019-03-27 Thread root
How to get the fix installed via apt?. any link..? -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to openssh in Ubuntu. https://bugs.launchpad.net/bugs/1794629 Title: CVE-2018-15473 - User enumeration vulnerability Status

[Touch-packages] [Bug 1158500] Re: auditd fails to add rules when used in precise with -lts-quantal kernel

2015-01-21 Thread g...@root-me.org
any news ? -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to audit in Ubuntu. https://bugs.launchpad.net/bugs/1158500 Title: auditd fails to add rules when used in precise with -lts-quantal kernel Status in audit package

[Touch-packages] [Bug 1158500] Re: auditd fails to add rules when used in precise with -lts-quantal kernel

2015-01-05 Thread g...@root-me.org
We really need to have auditd working ! More than annoying I find this bug quite critical given it renders auditd almost useless. = so true, it's quite amazing for a LTS/stable branch... Please do something :-) -- You received this bug notification because you are a member of Ubuntu Touch