[Bug 1554227] Re: DHCP unicast requests are not responded to

2016-03-08 Thread Eric Desrochers
** Changed in: nova Status: New => Confirmed ** Changed in: nova (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1554227 Title: DHCP

[Bug 1554540] [NEW] DHCP unicast requests are not responding

2016-03-08 Thread Eric Desrochers
Public bug reported: Issue: We run nova-network in VLAN+multi_host mode on Kilo and notice that only one dnsmasq process (either the oldest or newest) on the hypervisor responds to unicast BOOTPREQUESTS. dhclient on VMs will retry until it eventually gives up and broadcasts the request, which

[Bug 1554540] Re: DHCP unicast requests are not responding

2016-03-08 Thread Eric Desrochers
Upstream bug for OpenStack Compute (nova): https://bugs.launchpad.net/nova/+bug/1554227 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1554540 Title: DHCP unicast requests are not

[Bug 1546735] Re: openipmi package compile without SSL

2016-03-04 Thread Eric Desrochers
** Changed in: openipmi (Ubuntu) Assignee: (unassigned) => Eric Desrochers (slashd) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openipmi in Ubuntu. https://bugs.launchpad.net/bugs/1546735 Title: openipmi package comp

[Bug 1546735] Re: openipmi package compile without SSL

2016-02-27 Thread Eric Desrochers
** Changed in: openipmi (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openipmi in Ubuntu. https://bugs.launchpad.net/bugs/1546735 Title: openipmi package compile without SSL To manage

[Bug 1546735] Re: openipmi package compile without SSL

2016-02-26 Thread Eric Desrochers
Debian package for unstable # filename: openipmi-2.0.21/debian/changelog openipmi (2.0.21-1) unstable; urgency=medium ... * enabled openssl. closes: #775847 ... -- Noël Köthe Thu, 25 Feb 2016 12:06:21 +0100 -- You received this bug notification because you are a member

[Bug 1546735] Re: openipmi package compile without SSL

2016-02-26 Thread Eric Desrochers
Following a discussion with the Debian distribution maintenance software "Noël Köthe ". SSL support has been enabled by debian upstream maintainer and has now landed in unstable in openipmi-2.0.21. -- You received this bug notification because you are a member of Ubuntu Server

[Bug 1546735] Re: openipmi package compile without SSL

2016-02-18 Thread Eric Desrochers
** Tags added: sts -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openipmi in Ubuntu. https://bugs.launchpad.net/bugs/1546735 Title: openipmi package compile without SSL To manage notifications about this bug go to:

[Bug 1546735] [NEW] openipmi package compile without SSL

2016-02-17 Thread Eric Desrochers
Public bug reported: It has been brought to my attention by the community that package "openipmi" is build without openssl. Taken from "openipmi-2.0.18" source code: -- filename:debian/rules --- 23 config.status: configure 24 dh_testdir 25 dh_autotools-dev_updateconfig 26 # Add here commands to

[Bug 1479652] Re: [patch] ntpd rejects source UDP ports less than 123 as bogus

2016-02-11 Thread Eric Desrochers
It has been brought to my attention ... -- I confirm that the proposed testfix package resolved the issue on Trusty. The test were made on test machines where the client had an iptable postrouting nat forcing the source port to be under 123. - ntpdate command performed on the client machine was

[Bug 1479652] Re: [patch] ntpd rejects source UDP ports less than 123 as bogus

2016-02-11 Thread Eric Desrochers
** Tags removed: verification-done ** Tags added: verification-done-trusty -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to ntp in Ubuntu. https://bugs.launchpad.net/bugs/1479652 Title: [patch] ntpd rejects source UDP ports less than

[Bug 1479652] Re: [patch] ntpd rejects source UDP ports less than 123 as bogus

2016-02-11 Thread Eric Desrochers
I confirmed the package"4.2.6.p3+dfsg-1ubuntu3.9" solved the problem in Ubuntu Precise NTP Version : 1:4.2.6.p3+dfsg-1ubuntu3.1 With no IPTABLES rule ==> Working $ ntpdate x.x.x.x 11 Feb 16:15:19 ntpdate[1243]: adjust time server x.x.x.x offset 0.190571 sec With IPTABLES rule ==> Not working $

[Bug 1479652] Re: [patch] ntpd rejects source UDP ports less than 123 as bogus

2016-02-11 Thread Eric Desrochers
I confirmed the package "4.2.6.p5+dfsg-3ubuntu8.2" solve the bug in Ubuntu Wily # With port <123 using ntpdate (without patch) 11 Feb 20:30:09 ntpdate[2348]: no server suitable for synchronization found # With port <123 using ntpdate (including patch) 11 Feb 20:32:18 ntpdate[3243]: adjust time

[Bug 1479652] Re: [patch] ntpd rejects source UDP ports less than 123 as bogus

2016-01-25 Thread Eric Desrochers
** Description changed: [Impact] If an NTP client sends a request with a source port less than 123, the packet is silently ignored by ntpd. This is occurring in our environment due to NAT. [Test Case] The problem can easily be reproduced by having an iptable postrouting nat

[Bug 1479652] Re: [patch] ntpd rejects source UDP ports less than 123 as bogus

2016-01-25 Thread Eric Desrochers
** Description changed: [Impact] If an NTP client sends a request with a source port less than 123, the packet is silently ignored by ntpd. This is occurring in our environment due to NAT. [Test Case] The problem can easily be reproduced by having an iptable postrouting nat

[Bug 1479652] Re: [patch] ntpd rejects source UDP ports less than 123 as bogus

2016-01-25 Thread Eric Desrochers
I have build a test package for the community to validate it solve the bug before starting the SRU process [1]. The goal of this testfix is only to confirm that this solve the bug and it is not a final solution. Here's what has been brought to my attention about the test package I have

[Bug 1479652] Re: [patch] ntpd rejects source UDP ports less than 123 as bogus

2016-01-25 Thread Eric Desrochers
** Tags added: sts -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to ntp in Ubuntu. https://bugs.launchpad.net/bugs/1479652 Title: [patch] ntpd rejects source UDP ports less than 123 as bogus To manage notifications about this bug go

[Bug 1479652] Re: [patch] ntpd rejects source UDP ports less than 123 as bogus

2016-01-25 Thread Eric Desrochers
** Description changed: + [Impact] + + If an NTP client sends a request with a source port less than 123, the packet is silently ignored by ntpd. + This is occurring in our environment due to NAT. + + [Test Case] + + The problem can easily be reproduced by having an iptable postrouting + nat

[Bug 1479652] Re: [patch] ntpd rejects source UDP ports less than 123 as bogus

2016-01-25 Thread Eric Desrochers
Patch -- Distribution : Trusty (14.04) Package version : ntp_4.2.6.p5+dfsg-3ubuntu2.14.04.8 -- Note: kick-d is currently working on a merge for Xenial, including this patch. I'm including the .debdiffs for the other distributions (W/T/P) for once the merge for Xenial will be completed. **

[Bug 1479652] Re: [patch] ntpd rejects source UDP ports less than 123 as bogus

2016-01-25 Thread Eric Desrochers
Patch -- Distribution : Precise (12.04) Package version : 4.2.6.p3+dfsg-1ubuntu3.9 -- ** Patch added: "precise_ntp_4.2.6.p3+dfsg-1ubuntu3.9" https://bugs.launchpad.net/ubuntu/precise/+source/ntp/+bug/1479652/+attachment/4556380/+files/lp1479652_precise_3.9.debdiff -- You received this bug

[Bug 1479652] Re: [patch] ntpd rejects source UDP ports less than 123 as bogus

2016-01-25 Thread Eric Desrochers
Patch -- Distribution : Wily (15.10) Package version : 4.2.6.p5+dfsg-3ubuntu8.2 -- ** Patch added: "wily_4.2.6.p5+dfsg-3ubuntu8.2" https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1479652/+attachment/4556354/+files/lp1479652_wily_8.2.debdiff -- You received this bug notification because

[Bug 1479652] Re: [patch] ntpd rejects source UDP ports less than 123 as bogus

2016-01-23 Thread Eric Desrochers
** Changed in: ntp (Ubuntu Xenial) Status: New => In Progress ** Changed in: ntp (Ubuntu Wily) Status: New => In Progress ** Changed in: ntp (Ubuntu Precise) Status: New => In Progress ** Changed in: ntp (Ubuntu Trusty) Status: New => In Progress -- You received

[Bug 1479652] Re: [patch] ntpd rejects source UDP ports less than 123 as bogus

2016-01-22 Thread Eric Desrochers
** Changed in: ntp (Ubuntu Precise) Assignee: (unassigned) => Eric Desrochers (slashd) ** Changed in: ntp (Ubuntu Trusty) Assignee: (unassigned) => Eric Desrochers (slashd) ** Changed in: ntp (Ubuntu Wily) Assignee: (unassigned) => Eric Desrochers (slashd) ** Changed i

[Bug 1481388] Re: NTP : Use-after-free in routing socket code after dropping root

2015-12-10 Thread Eric Desrochers
** Tags removed: verification-needed ** Tags added: verification-done -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1481388 Title: NTP : Use-after-free in routing socket code after

[Bug 1498697] Re: Targets are not consistently shown with large numbers of targets

2015-12-10 Thread Eric Desrochers
** Tags removed: verification-needed ** Tags added: verification-done -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to tgt in Ubuntu. https://bugs.launchpad.net/bugs/1498697 Title: Targets are not consistently shown with large

[Bug 1481388] Re: NTP : Use-after-free in routing socket code after dropping root

2015-11-16 Thread Eric Desrochers
** Tags removed: verification-needed ** Tags added: verification-done -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1481388 Title: NTP : Use-after-free in routing socket code after

[Bug 1481388] Re: NTP : Use-after-free in routing socket code after dropping root

2015-11-05 Thread Eric Desrochers
** Tags added: sts -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1481388 Title: NTP : Use-after-free in routing socket code after dropping root To manage notifications about this

[Bug 1481388] Re: NTP : Use-after-free in routing socket code after dropping root

2015-10-29 Thread Eric Desrochers
** Patch removed: "debdiff for precise" https://bugs.launchpad.net/ubuntu/vivid/+source/ntp/+bug/1481388/+attachment/4452908/+files/lp1481388_precise.debdiff ** Patch removed: "debdiff for trusty"

[Bug 1481388] Re: NTP : Use-after-free in routing socket code after dropping root

2015-10-29 Thread Eric Desrochers
Here is the rebase debdiff for Precise ** Patch added: "Rebase Precise debdiff" https://bugs.launchpad.net/ubuntu/vivid/+source/ntp/+bug/1481388/+attachment/4508496/+files/lp1481388_rebase_precise.debdiff -- You received this bug notification because you are a member of Ubuntu Server Team,

[Bug 1481388] Re: NTP : Use-after-free in routing socket code after dropping root

2015-10-29 Thread Eric Desrochers
Here is the rebase debdiff for Trusty ** Patch added: "Rebase Trusty debdiff" https://bugs.launchpad.net/ubuntu/vivid/+source/ntp/+bug/1481388/+attachment/4508494/+files/lp1481388_rebase_trusty.debdiff -- You received this bug notification because you are a member of Ubuntu Server Team,

[Bug 1481388] Re: NTP : Use-after-free in routing socket code after dropping root

2015-10-29 Thread Eric Desrochers
Here is the rebase debdiff for Vivid ** Patch added: "Rebase Vivid debdiff" https://bugs.launchpad.net/ubuntu/vivid/+source/ntp/+bug/1481388/+attachment/4508498/+files/lp1481388_rebase_vivid.debdiff -- You received this bug notification because you are a member of Ubuntu Server Team, which

[Bug 1481388] Re: NTP : Use-after-free in routing socket code after dropping root

2015-10-28 Thread Eric Desrochers
Hi Mathew, I have the knowledge of the code, I will rebase the debdiffs for V/T/P Note: I checked and Xenial has the patch already. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to the bug report.

[Bug 1481388] Re: NTP : Use-after-free in routing socket code after dropping root

2015-10-27 Thread Eric Desrochers
** Tags removed: verification-needed ** Tags added: verification-done -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1481388 Title: NTP : Use-after-free in routing socket code after

[Bug 1481388] Re: NTP : Use-after-free in routing socket code after dropping root

2015-10-27 Thread Eric Desrochers
Good evening Chris, This bug has been brought to my attention by someone in the community. Unfortunately, I never had a confirmation from him if the fix solve his issue or not... but as state in comment #5 & #11, I've been able to reproduce the problem and make sure it addressed the situation.

[Bug 1481388] Re: NTP : Use-after-free in routing socket code after dropping root

2015-10-27 Thread Eric Desrochers
Good evening Mathew, Does it mean I need to re-do the debdiffs ? -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1481388 Title: NTP : Use-after-free in routing socket code after

[Bug 1498697] Re: Targets are not consistently shown with large numbers of targets

2015-10-06 Thread Eric Desrochers
** Tags removed: verification-needed ** Tags added: verification-done -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to tgt in Ubuntu. https://bugs.launchpad.net/bugs/1498697 Title: Targets are not consistently shown with large

[Bug 1498697] Re: Targets are not consistently shown with large numbers of targets

2015-10-02 Thread Eric Desrochers
As per our irc conversation, I'm removing the "2nd debdiff for Vivid" and arges will re-upload the fix with the original patch I posted for Vivid. Sorry for the confusion, and thanks Brian for you feedbacks on this. ** Patch removed: "2nd debdiff for Vivid"

[Bug 1498697] Re: Targets are not consistently shown with large numbers of targets

2015-10-02 Thread Eric Desrochers
Source version has been modified for version "1:1.0.17-1ubuntu2.1". Thanks ! ** Patch added: "debdiff for Precise-2" https://bugs.launchpad.net/ubuntu/+source/tgt/+bug/1498697/+attachment/4482207/+files/lp1498697-precise-2.debdiff -- You received this bug notification because you are a

[Bug 1498697] Re: Targets are not consistently shown with large numbers of targets

2015-10-01 Thread Eric Desrochers
Hi Brian, I got a discussion with arges yesterday about it. vivid version of tgt didn't build with this error : sbuild-build-depends-tgt-dummy : Depends: libibverbs-dev (>= 1.1.8-1ubuntu1.1) but 1.1.8-1ubuntu1 is to be installed I think it has something to do with this LP patch : LP:

[Bug 1498697] Re: Targets are not consistently shown with large numbers of targets

2015-09-30 Thread Eric Desrochers
** Tags added: sts -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to tgt in Ubuntu. https://bugs.launchpad.net/bugs/1498697 Title: Targets are not consistently shown with large numbers of targets To manage notifications about this

[Bug 1498697] Re: Targets are not consistently shown with large numbers of targets

2015-09-30 Thread Eric Desrochers
2nd debdiff for Vivid (Fixing the unmet depencies of "libibverbs-dev") ** Patch added: "2nd debdiff for Vivid" https://bugs.launchpad.net/ubuntu/trusty/+source/tgt/+bug/1498697/+attachment/4480119/+files/lp1498697_vivid2.debdiff -- You received this bug notification because you are a member

[Bug 1498697] Re: Targets are not consistently shown with large numbers of targets

2015-09-25 Thread Eric Desrochers
debdiff for Precise ** Changed in: tgt (Ubuntu Precise) Status: New => In Progress ** Changed in: tgt (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: tgt (Ubuntu Precise) Assignee: (unassigned) => Eric Desrochers (eric-desrochers-z) ** Patch added:

[Bug 1498697] Re: Targets are not consistently shown with large numbers of targets

2015-09-24 Thread Eric Desrochers
debdiff for Trusty ** Description changed: + SRU JUSTIFICATION + + [Impact] + + * tgtadm returns inconsistents results. Some targets are not +listed during one run, but are shown by a run immediately after. + + [Test Case] + + * With large number of targets : + + # ./tgtadm -L iscsi

[Bug 1498697] Re: Targets are not consistently shown with large numbers of targets

2015-09-24 Thread Eric Desrochers
** Tags added: verification-done ** Changed in: tgt (Ubuntu Trusty) Status: Confirmed => In Progress -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to tgt in Ubuntu. https://bugs.launchpad.net/bugs/1498697 Title: Targets are

[Bug 1498697] Re: Targets are not consistently shown with large numbers of targets

2015-09-24 Thread Eric Desrochers
debdiff for Vivid ** Changed in: tgt (Ubuntu Vivid) Status: New => Confirmed ** Changed in: tgt (Ubuntu Vivid) Assignee: (unassigned) => Eric Desrochers (eric-desrochers-z) ** Changed in: tgt (Ubuntu Vivid) Importance: Undecided => High ** Changed in: tgt (Ubu

[Bug 1498697] Re: Targets are not consistently shown with large numbers of targets

2015-09-23 Thread Eric Desrochers
://launchpad.net/~eric-desrochers-z/+archive/ubuntu/tgt1498697 [2] 6c4ffa0 tgtadm: fix a bug to read the response buffer -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to tgt in Ubuntu. https://bugs.launchpad.net/bugs/1498697 Title

[Bug 1498697] Re: Targets are not consistently shown with large numbers of targets

2015-09-23 Thread Eric Desrochers
** Changed in: tgt (Ubuntu Trusty) Importance: Undecided => High ** Changed in: tgt (Ubuntu Trusty) Status: New => Confirmed ** Changed in: tgt (Ubuntu Trusty) Assignee: (unassigned) => Eric Desrochers (eric-desrochers-z) -- You received this bug notification be

[Bug 1481388] Re: NTP : Use-after-free in routing socket code after dropping root

2015-09-17 Thread Eric Desrochers
Simon, you may want to add a few ethernet interfaces and static routes. I was able to reproduce it with ~6 network interface. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1481388

[Bug 1481388] Re: NTP : Use-after-free in routing socket code after dropping root

2015-09-02 Thread Eric Desrochers
** Changed in: ntp (Ubuntu Wily) Importance: Low => Medium -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1481388 Title: NTP : Use-after-free in routing socket code after dropping

[Bug 1481388] Re: NTP : Use-after-free in routing socket code after dropping root

2015-09-02 Thread Eric Desrochers
debdiff for vivid ** Patch added: "debdiff for vivid" https://bugs.launchpad.net/ubuntu/vivid/+source/ntp/+bug/1481388/+attachment/4456186/+files/lp1481388_vivid.debdiff -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to the bug

[Bug 1481388] Re: NTP : Use-after-free in routing socket code after dropping root

2015-09-02 Thread Eric Desrochers
debdiff for wily ** Patch added: "debdiff for wily" https://bugs.launchpad.net/ubuntu/vivid/+source/ntp/+bug/1481388/+attachment/4456187/+files/lp1481388_wily.debdiff ** Changed in: ntp (Ubuntu Wily) Status: Confirmed => In Progress -- You received this bug notification because you

[Bug 1481388] Re: NTP : Use-after-free in routing socket code after dropping root

2015-09-02 Thread Eric Desrochers
** Patch removed: "debdiff for Vivid" https://bugs.launchpad.net/ubuntu/vivid/+source/ntp/+bug/1481388/+attachment/4455714/+files/lp1481388_vivid.debdiff -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to the bug report.

[Bug 1481388] Re: NTP : Use-after-free in routing socket code after dropping root

2015-09-01 Thread Eric Desrochers
debdiff for Vivid ** Patch added: "debdiff for Vivid" https://bugs.launchpad.net/ubuntu/precise/+source/ntp/+bug/1481388/+attachment/4455714/+files/lp1481388_vivid.debdiff ** Changed in: ntp (Ubuntu Vivid) Status: Confirmed => In Progress ** Changed in: ntp (Ubuntu Vivid)

[Bug 1481388] Re: NTP : Use-after-free in routing socket code after dropping root

2015-08-27 Thread Eric Desrochers
debdiff for trusty ** Patch added: 1:4.2.6.p5+dfsg-3ubuntu2.14.04.4 https://bugs.launchpad.net/ubuntu/precise/+source/ntp/+bug/1481388/+attachment/4453392/+files/lp1481388_trusty.debdiff ** Changed in: ntp (Ubuntu Trusty) Status: Confirmed = In Progress ** Changed in: ntp (Ubuntu

[Bug 1481388] Re: NTP : Use-after-free in routing socket code after dropping root

2015-08-27 Thread Eric Desrochers
I also noticed the situation can be reproduced at boot if the value of net.core.rmem_default is too low. I reproduced it by only lowering the net.core.rmem_default = 2000 value with 6 network interface at boot. ntpd[851]: ntp_io: estimated max descriptors: 1024, initial socket boundary: 16

[Bug 1481388] Re: NTP : Use-after-free in routing socket code after dropping root

2015-08-26 Thread Eric Desrochers
** Changed in: ntp (Ubuntu Precise) Assignee: (unassigned) = Eric Desrochers (eric-desrochers-z) ** Changed in: ntp (Ubuntu Vivid) Assignee: (unassigned) = Eric Desrochers (eric-desrochers-z) ** Changed in: ntp (Ubuntu Precise) Status: New = Confirmed -- You received this bug

[Bug 1481388] Re: NTP : Use-after-free in routing socket code after dropping root

2015-08-26 Thread Eric Desrochers
** Changed in: ntp (Ubuntu Precise) Importance: Undecided = Medium ** Changed in: ntp (Ubuntu Vivid) Status: New = Confirmed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to the bug report.

[Bug 1481388] Re: NTP : Use-after-free in routing socket code after dropping root

2015-08-26 Thread Eric Desrochers
debdiff for precise ** Description changed: + [Impact] + + * User experienced repeated segfaults at the same instruction pointer + + i/o error on routing socket No buffer space available - disabling + segfault at 31 ip 0031 sp 79f11788 error 14 in

[Bug 1481388] Re: NTP : Use-after-free in routing socket code after dropping root

2015-08-26 Thread Eric Desrochers
debdiff for precise -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1481388 Title: NTP : Use-after-free in routing socket code after dropping root To manage notifications about this

[Bug 1481388] Re: NTP : Use-after-free in routing socket code after dropping root

2015-08-26 Thread Eric Desrochers
debdiff for precise -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1481388 Title: NTP : Use-after-free in routing socket code after dropping root To manage notifications about this

[Bug 1481388] Re: NTP : Use-after-free in routing socket code after dropping root

2015-08-26 Thread Eric Desrochers
debdiff for precise ** Patch added: debdiff for precise https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1481388/+attachment/4452908/+files/lp1481388_precise.debdiff -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to the bug

[Bug 1481388] Re: NTP : Use-after-free in routing socket code after dropping root

2015-08-24 Thread Eric Desrochers
and net.core.wmem_maxvalues equally until the routing socket reports: No buffer space available message no longer showed up. [1] 1:4.2.6.p3+dfsg-1ubuntu3.4+20150820lp1481388~2 https://launchpad.net/~eric-desrochers-z/+archive/ubuntu/lp1481388 -- You received this bug notification because you are a member of Ubuntu