This affects each system where /tmp is *not* on tmpfs which affects a
lot of cloud-built servers and effectively prevents usage of systemd-
analyze verify in Ansible, Puppet etc.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://
Thank you, makes perfect sense. I have preemptively suggested
improvements to the zstd module to avoid repeating the issues with
brotli.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1829383
Title:
Public bug reported:
These two modules are now pretty mainstream and should be available
within Ubuntu repo (e.g. nginx-extras line):
https://github.com/tokers/zstd-nginx-module
https://github.com/google/ngx_brotli
** Affects: nginx (Ubuntu)
Importance: Undecided
Status: New
--
Y
The fix I implemented in my system was to add the following check to
/usr/lib/python2.7/dist-packages/apparmor/logparser.py, in lines 124:
if rmask and rmask not in [ 'send', 'receive', 'send receive' ]:
Originally it was:
if rmask:
The same in line 130 for dmask. This file comes from python-ap
I have the 2.9 package but this bug still seems to affect me:
ii apparmor-utils 2.9.2~2880-0ubun amd64Utilities
for controlling AppArmor
# aa-logprof
Reading log entries from /var/log/syslog.
Updating AppArmor profiles in /etc/apparmor.d.
Traceback (most recent call last):
Public bug reported:
QtWebkit crashes with SIGSEGV on the following page:
http://www.complex.com/style/2014/11/watch-this-deaf-mom-totally-crush-
this-usher-choreography
Stack trace:
#0 0xa81ee1eb in ?? ()
No symbol table info available.
#1 0xb39e2d84 in JSC::Interpreter::executeCall(JSC::Exe
Public bug reported:
Attempt to load the following page
http://www.star.gr/Pages/Oikonomia.aspx?art=252401
results in SIGSEGV. Full stack trace:
#0 0xb451620b in QNetworkAccessManager::cookieJar() const () from
/usr/lib/i386-linux-gnu/libQtNetwork.so.4
#1 0xb2efffe7 in
WebCore::thirdPartyCo
Public bug reported:
While loading this page
http://www.aleqt.com/2014/11/28/article_910177.html I get SIGSEGV with
the following stack trace:
#0 0x7fcf592fa787 in QtMIMETypeSniffer::~QtMIMETypeSniffer() () from
/usr/lib/x86_64-linux-gnu/libQtWebKit.so.4
(gdb) bt
#0 0x7fcf592fa787 in Q