星球

RSS | RDF | ATOM

更新套件庫或安裝套件遇到「無法將 /var/lib/dpkg/lock 鎖定」 解法

2010/12/3 23:57:00 | 手把手玩Ubuntu
我想蠻多人更新套件庫或安裝套件時,會出現這個訊息 E: 無法將 /var/lib/dpkg/lock 鎖定 - open (11: 資源暫時無法取得) ,原因是使用 apt-get , aptitude , synaptic , software-center …等等的程式還沒有關閉。

如果忘記是那個程式沒關的話,可使用 lsof (list open files)...



請按標題讀更多:)


登入指定的 ttyN 使用英文環境

2010/12/3 19:35:00 | 手把手玩Ubuntu
一般登入ttyN在使用時,使用指令時反饋的訊息會是亂碼 (比如進入 aptitude 他的界面就變成亂碼) 這是因為你預設是使用中文語系的非英文語系,要能顯示中文還需要安裝其它套件才行。

要使用英文環境也蠻簡單的,只要輸入指令改變使用的語系,就能讓程式以英文方式執行,那麼反饋的訊息就會變成英文囉。

但是我想更偷懶點,當使用我指定某個 tty...



請按標題讀更多:)


Ubuntu Note of O'reilly style

2010/12/3 15:50:00 | 凍仁的 Ubuntu 筆記
凍仁家中其實也有不少 O'Reilly 的書籍,也一直很好奇在電腦書籍中為什麼只有他們家的封面都是用動物當主角,感謝 Edward 分享 為什麼 O'Reilly 都用動物當書籍封面 一文,讓凍仁又長了點見識,當然在最後也小玩一下搞了個假 O'Reilly Ubuntu 筆記。

看起來還真有那麼一回事呢!哪一天就輪到凍仁寫一本啦!!

相關連結:
Animal Menagerie | O'Reilly

資料來源:
O'Reilly Mmaker

USN-1025-1: Bind vulnerabilities

2010/12/2 2:41:59 | Ubuntu security notices

Referenced CVEs: 



CVE-2010-3613, CVE-2010-3614




Description: 




===========================================================
Ubuntu Security Notice USN-1025-1 December 01, 2010
bind9 vulnerabilities
CVE-2010-3613, CVE-2010-3614
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 8.04 LTS
Ubuntu 9.10
Ubuntu 10.04 LTS
Ubuntu 10.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
libdns23 1:9.3.2-2ubuntu1.12

Ubuntu 8.04 LTS:
libdns36 1:9.4.2.dfsg.P2-2ubuntu0.6

Ubuntu 9.10:
libdns53 1:9.6.1.dfsg.P1-3ubuntu0.4

Ubuntu 10.04 LTS:
libdns64 1:9.7.0.dfsg.P1-1ubuntu0.1

Ubuntu 10.10:
libdns66 1:9.7.1.dfsg.P2-2ubuntu0.1

In general, a standard system update will make all the necessary changes.

Details follow:

It was discovered that Bind would incorrectly allow a ncache entry and a
rrsig for the same type. A remote attacker could exploit this to cause
Bind to crash, resulting in a denial of service. (CVE-2010-3613)

It was discovered that Bind would incorrectly mark zone data as insecure
when the zone is undergoing a key algorithm rollover. (CVE-2010-3614)


USN-1024-1: OpenJDK vulnerability

2010/12/1 0:27:33 | Ubuntu security notices

Referenced CVEs: 



CVE-2010-3860




Description: 




===========================================================
Ubuntu Security Notice USN-1024-1 November 30, 2010
openjdk-6 vulnerability
CVE-2010-3860
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 8.04 LTS
Ubuntu 9.10
Ubuntu 10.04 LTS
Ubuntu 10.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 8.04 LTS:
icedtea6-plugin 6b18-1.8.3-0ubuntu1~8.04.2
openjdk-6-jdk 6b18-1.8.3-0ubuntu1~8.04.2
openjdk-6-jre 6b18-1.8.3-0ubuntu1~8.04.2
openjdk-6-jre-headless 6b18-1.8.3-0ubuntu1~8.04.2

Ubuntu 9.10:
icedtea6-plugin 6b18-1.8.3-0ubuntu1~9.10.1
openjdk-6-jdk 6b18-1.8.3-0ubuntu1~9.10.1
openjdk-6-jre 6b18-1.8.3-0ubuntu1~9.10.1
openjdk-6-jre-headless 6b18-1.8.3-0ubuntu1~9.10.1

Ubuntu 10.04 LTS:
icedtea6-plugin 6b20-1.9.2-0ubuntu1~10.04.1
openjdk-6-jdk 6b20-1.9.2-0ubuntu1~10.04.1
openjdk-6-jre 6b20-1.9.2-0ubuntu1~10.04.1
openjdk-6-jre-headless 6b20-1.9.2-0ubuntu1~10.04.1

Ubuntu 10.10:
icedtea6-plugin 6b20-1.9.2-0ubuntu1
openjdk-6-jdk 6b20-1.9.2-0ubuntu1
openjdk-6-jre 6b20-1.9.2-0ubuntu1
openjdk-6-jre-headless 6b20-1.9.2-0ubuntu1

After a standard system update you need to restart any Java services,
applications or applets to make all the necessary changes.

Details follow:

It was discovered that certain system property information was being
leaked, which could allow an attacker to obtain sensitive information.


USN-1023-1: Linux kernel vulnerabilities

2010/11/30 10:23:58 | Ubuntu security notices

Referenced CVEs: 



CVE-2010-3848, CVE-2010-3849, CVE-2010-3850




Description: 




===========================================================
Ubuntu Security Notice USN-1023-1 November 30, 2010
linux, linux-{ec2,source-2.6.15} vulnerabilities
CVE-2010-3848, CVE-2010-3849, CVE-2010-3850
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 8.04 LTS
Ubuntu 9.10
Ubuntu 10.04 LTS
Ubuntu 10.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
linux-image-2.6.15-55-386 2.6.15-55.90
linux-image-2.6.15-55-686 2.6.15-55.90
linux-image-2.6.15-55-amd64-generic 2.6.15-55.90
linux-image-2.6.15-55-amd64-k8 2.6.15-55.90
linux-image-2.6.15-55-amd64-server 2.6.15-55.90
linux-image-2.6.15-55-amd64-xeon 2.6.15-55.90
linux-image-2.6.15-55-hppa32 2.6.15-55.90
linux-image-2.6.15-55-hppa32-smp 2.6.15-55.90
linux-image-2.6.15-55-hppa64 2.6.15-55.90
linux-image-2.6.15-55-hppa64-smp 2.6.15-55.90
linux-image-2.6.15-55-itanium 2.6.15-55.90
linux-image-2.6.15-55-itanium-smp 2.6.15-55.90
linux-image-2.6.15-55-k7 2.6.15-55.90
linux-image-2.6.15-55-mckinley 2.6.15-55.90
linux-image-2.6.15-55-mckinley-smp 2.6.15-55.90
linux-image-2.6.15-55-powerpc 2.6.15-55.90
linux-image-2.6.15-55-powerpc-smp 2.6.15-55.90
linux-image-2.6.15-55-powerpc64-smp 2.6.15-55.90
linux-image-2.6.15-55-server 2.6.15-55.90
linux-image-2.6.15-55-server-bigiron 2.6.15-55.90
linux-image-2.6.15-55-sparc64 2.6.15-55.90
linux-image-2.6.15-55-sparc64-smp 2.6.15-55.90

Ubuntu 8.04 LTS:
linux-image-2.6.24-28-386 2.6.24-28.81
linux-image-2.6.24-28-generic 2.6.24-28.81
linux-image-2.6.24-28-hppa32 2.6.24-28.81
linux-image-2.6.24-28-hppa64 2.6.24-28.81
linux-image-2.6.24-28-itanium 2.6.24-28.81
linux-image-2.6.24-28-lpia 2.6.24-28.81
linux-image-2.6.24-28-lpiacompat 2.6.24-28.81
linux-image-2.6.24-28-mckinley 2.6.24-28.81
linux-image-2.6.24-28-openvz 2.6.24-28.81
linux-image-2.6.24-28-powerpc 2.6.24-28.81
linux-image-2.6.24-28-powerpc-smp 2.6.24-28.81
linux-image-2.6.24-28-powerpc64-smp 2.6.24-28.81
linux-image-2.6.24-28-rt 2.6.24-28.81
linux-image-2.6.24-28-server 2.6.24-28.81
linux-image-2.6.24-28-sparc64 2.6.24-28.81
linux-image-2.6.24-28-sparc64-smp 2.6.24-28.81
linux-image-2.6.24-28-virtual 2.6.24-28.81
linux-image-2.6.24-28-xen 2.6.24-28.81

Ubuntu 9.10:
linux-image-2.6.31-22-386 2.6.31-22.69
linux-image-2.6.31-22-generic 2.6.31-22.69
linux-image-2.6.31-22-generic-pae 2.6.31-22.69
linux-image-2.6.31-22-ia64 2.6.31-22.69
linux-image-2.6.31-22-lpia 2.6.31-22.69
linux-image-2.6.31-22-powerpc 2.6.31-22.69
linux-image-2.6.31-22-powerpc-smp 2.6.31-22.69
linux-image-2.6.31-22-powerpc64-smp 2.6.31-22.69
linux-image-2.6.31-22-server 2.6.31-22.69
linux-image-2.6.31-22-sparc64 2.6.31-22.69
linux-image-2.6.31-22-sparc64-smp 2.6.31-22.69
linux-image-2.6.31-22-virtual 2.6.31-22.69
linux-image-2.6.31-307-ec2 2.6.31-307.22

Ubuntu 10.04 LTS:
linux-image-2.6.32-26-386 2.6.32-26.48
linux-image-2.6.32-26-generic 2.6.32-26.48
linux-image-2.6.32-26-generic-pae 2.6.32-26.48
linux-image-2.6.32-26-ia64 2.6.32-26.48
linux-image-2.6.32-26-lpia 2.6.32-26.48
linux-image-2.6.32-26-powerpc 2.6.32-26.48
linux-image-2.6.32-26-powerpc-smp 2.6.32-26.48
linux-image-2.6.32-26-powerpc64-smp 2.6.32-26.48
linux-image-2.6.32-26-preempt 2.6.32-26.48
linux-image-2.6.32-26-server 2.6.32-26.48
linux-image-2.6.32-26-sparc64 2.6.32-26.48
linux-image-2.6.32-26-sparc64-smp 2.6.32-26.48
linux-image-2.6.32-26-versatile 2.6.32-26.48
linux-image-2.6.32-26-virtual 2.6.32-26.48
linux-image-2.6.32-310-ec2 2.6.32-310.21

Ubuntu 10.10:
linux-image-2.6.35-23-generic 2.6.35-23.41
linux-image-2.6.35-23-generic-pae 2.6.35-23.41
linux-image-2.6.35-23-omap 2.6.35-23.41
linux-image-2.6.35-23-powerpc 2.6.35-23.41
linux-image-2.6.35-23-powerpc-smp 2.6.35-23.41
linux-image-2.6.35-23-powerpc64-smp 2.6.35-23.41
linux-image-2.6.35-23-server 2.6.35-23.41
linux-image-2.6.35-23-versatile 2.6.35-23.41
linux-image-2.6.35-23-virtual 2.6.35-23.41

After a standard system update you need to reboot your computer to make
all the necessary changes.

Details follow:

Nelson Elhage discovered several problems with the Acorn Econet protocol
driver. A local user could cause a denial of service via a NULL pointer
dereference, escalate privileges by overflowing the kernel stack, and
assign Econet addresses to arbitrary interfaces.


Ubuntu 10.10 Countdown Party @Taipei 101

2010/11/28 19:25:00 | 凍仁的 Ubuntu 筆記
10 月 10 日除了是雙十國慶以外,對凍仁而言還是 Ubuntu 10.10 釋出的大日子,這次很幸運的可以到 Canonical Taiwan Office 參與 Countdown Party,而且也可能是最後一次能在 Taipei 101 的 Canonical Taiwan 舉辦,這次的活動場地 ----「會議室B?」將改為其他用途,相信這也能代表著 Canonical Taiwna 愈來愈有發展。


Powered by Austin Tuan

Ubuntu 10.10 釋出的時間據說是英國的 10:10,也就是 Tanwian 時間的 06:10,很高興能在這天跟志同道合的朋友聚聚,當中也有不少伙伴迫不及待,直接在 Canonical download Ubuntu 10.10,不過也因這樣害得凍仁都無法上網,補上很久之前就該放上的簡報,

[!IFRAME FILTERED!]

這次只有小小試玩了一下 unity,可能是手邊機器的等級不夠力個關係,只有公司的工作站跑的比較順,目前的技術得配 CPU 較高的電腦才行,可凍仁會跳 Linux 就是因為牠比起 Vista 還省效能。

# 簡報中所用的字型為 Ubuntu 10.04 所內建的 Ubuntu-Title,似乎與 Ubuntu 10.10 的 Ubuntu 字型有所不同。

相關連結:
[活動消息] 在 101 的 Ubuntu 10.10 釋出倒數啪 | Ubuntu 正體中文站
Ubuntu密技 - 在各種文件內即時使用Google查詢 | Alfred's Cave

使用PPA來源安裝jdownloader [10.04,10.10]

2010/11/28 16:30:00 | 手把手玩Ubuntu
於年初介紹過的好用的跨平台下載軟體 –...



請按標題讀更多:)


USN-1022-1: APR-util vulnerability

2010/11/25 22:35:03 | Ubuntu security notices

Referenced CVEs: 



CVE-2010-1623




Description: 




===========================================================
Ubuntu Security Notice USN-1022-1 November 25, 2010
apr-util vulnerability
CVE-2010-1623
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 8.04 LTS
Ubuntu 9.10
Ubuntu 10.04 LTS
Ubuntu 10.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 8.04 LTS:
libaprutil1 1.2.12+dfsg-3ubuntu0.3

Ubuntu 9.10:
libaprutil1 1.3.9+dfsg-1ubuntu1.1

Ubuntu 10.04 LTS:
libaprutil1 1.3.9+dfsg-3ubuntu0.10.04.1

Ubuntu 10.10:
libaprutil1 1.3.9+dfsg-3ubuntu0.10.10.1

After a standard system update you need to restart any applications using
APR-util, such as Subversion and Apache, to make all the necessary changes.

Details follow:

It was discovered that APR-util did not properly handle memory when
destroying APR buckets. An attacker could exploit this and cause a denial
of service via memory exhaustion.


USN-1021-1: Apache vulnerabilities

2010/11/25 22:27:10 | Ubuntu security notices

Referenced CVEs: 



CVE-2010-1452, CVE-2010-1623




Description: 




===========================================================
Ubuntu Security Notice USN-1021-1 November 25, 2010
apache2 vulnerabilities
CVE-2010-1452, CVE-2010-1623
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 8.04 LTS
Ubuntu 9.10
Ubuntu 10.04 LTS
Ubuntu 10.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
apache2-common 2.0.55-4ubuntu2.12

Ubuntu 8.04 LTS:
apache2.2-common 2.2.8-1ubuntu0.19

Ubuntu 9.10:
apache2.2-common 2.2.12-1ubuntu2.4

Ubuntu 10.04 LTS:
apache2.2-common 2.2.14-5ubuntu8.4

Ubuntu 10.10:
apache2.2-common 2.2.16-1ubuntu3.1

In general, a standard system update will make all the necessary changes.

Details follow:

It was discovered that Apache's mod_cache and mod_dav modules incorrectly
handled requests that lacked a path. A remote attacker could exploit this
with a crafted request and cause a denial of service. This issue affected
Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. (CVE-2010-1452)

It was discovered that Apache did not properly handle memory when
destroying APR buckets. A remote attacker could exploit this with crafted
requests and cause a denial of service via memory exhaustion. This issue
affected Ubuntu 6.06 LTS and 10.10. (CVE-2010-1623)