[Bug 1382871] Re: [SRU] ettercap
Timo Jyrinki
timo.jyrinki at canonical.com
Mon Dec 1 10:29:16 UTC 2014
Thanks for the cherry-picked fix! I tested it to be working on 14.04 LTS
and uploaded it. Currently it sits in the unapproved queue at
https://launchpad.net/ubuntu/trusty/+queue?queue_state=1&queue_text=
** Changed in: ettercap (Ubuntu)
Status: New => In Progress
** Also affects: ettercap (Ubuntu Trusty)
Importance: Undecided
Status: New
** Changed in: ettercap (Ubuntu Trusty)
Assignee: (unassigned) => Timo Jyrinki (timo-jyrinki)
** Changed in: ettercap (Ubuntu Trusty)
Status: New => In Progress
** Changed in: ettercap (Ubuntu)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Sponsors Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1382871
Title:
[SRU] ettercap
Status in ettercap package in Ubuntu:
Fix Released
Status in ettercap source package in Trusty:
In Progress
Bug description:
[Impact]
scan for hosts while sniffing is active causes a crash into ubuntu
trusty.
[Test Case]
Run ettercap, select interface, start sniffing, scan for hosts, enjoy
your crash
[Regression Potential]
none
[Other Info]
(upstream hat on) Honestly I would like to see 0.8.1 as SRU replacement for 0.8.0, since there were many and many bugs against scan for hosts, that we fixed by properly handling multithread, lock and unlock, by avoiding many kind of crash, fixing timeouts, improving efficiency of scan, fixing ipv6 scan and so on.
But I don't think any sponsor will accept 0.8.1, so I'm giving you the little patch to at least fix this crash when scan for hosts.
(at least other two crashes can be fixed, but I would like to keep the patch as minimal as possible, and fix this one because occurs *always* with the kernel on trusty).
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ettercap/+bug/1382871/+subscriptions
More information about the Ubuntu-sponsors
mailing list