Linux websever 5.15.0-153-generic #163-Ubuntu SMP Thu Aug 7 16:37:18 UTC 2025 x86_64
Apache/2.4.52 (Ubuntu)
: 192.168.3.70 | : 192.168.1.99
Cant Read [ /etc/named.conf ]
8.1.2-1ubuntu2.23
urlab
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
var /
log /
[ HOME SHELL ]
Name
Size
Permission
Action
apache2
[ DIR ]
drwxr-x---
apt
[ DIR ]
drwxr-xr-x
dbconfig-common
[ DIR ]
drwxr-xr-x
dist-upgrade
[ DIR ]
drwxr-xr-x
installer
[ DIR ]
drwxr-x---
journal
[ DIR ]
drwxr-sr-x
landscape
[ DIR ]
drwxr-xr-x
letsencrypt
[ DIR ]
drwx------
mysql
[ DIR ]
drwxr-s---
nginx
[ DIR ]
drwxr-xr-x
ntpstats
[ DIR ]
drwxr-xr-x
postgresql
[ DIR ]
drwxrwxr-t
private
[ DIR ]
drwx------
samba
[ DIR ]
drwxr-x---
sssd
[ DIR ]
drwxr-x---
sysstat
[ DIR ]
drwxr-xr-x
unattended-upgrades
[ DIR ]
drwxr-x---
alternatives.log
0
B
-rw-r--r--
alternatives.log.1
564
B
-rw-r--r--
alternatives.log.10.gz
699
B
-rw-r--r--
alternatives.log.11.gz
438
B
-rw-r--r--
alternatives.log.12.gz
549
B
-rw-r--r--
alternatives.log.2.gz
617
B
-rw-r--r--
alternatives.log.3.gz
615
B
-rw-r--r--
alternatives.log.4.gz
174
B
-rw-r--r--
alternatives.log.5.gz
646
B
-rw-r--r--
alternatives.log.6.gz
625
B
-rw-r--r--
alternatives.log.7.gz
616
B
-rw-r--r--
alternatives.log.8.gz
518
B
-rw-r--r--
alternatives.log.9.gz
437
B
-rw-r--r--
apport.log
12.01
KB
-rw-r-----
apport.log.1
499
B
-rw-r-----
apport.log.2.gz
259
B
-rw-r-----
apport.log.3.gz
263
B
-rw-r-----
apport.log.4.gz
628
B
-rw-r-----
apport.log.5.gz
296
B
-rw-r-----
apport.log.6.gz
262
B
-rw-r-----
apport.log.7.gz
447
B
-rw-r-----
auth.log
226.08
KB
-rw-r-----
auth.log.1
390.01
KB
-rw-r-----
auth.log.2.gz
20.94
KB
-rw-r-----
auth.log.3.gz
24.6
KB
-rw-r-----
auth.log.4.gz
24.15
KB
-rw-r-----
bootstrap.log
63.04
KB
-rw-r--r--
btmp
1.5
KB
-rw-rw----
btmp.1
8.63
KB
-rw-rw----
cloud-init-output.log
23.37
KB
-rw-r-----
cloud-init.log
507.23
KB
-rw-r-----
dmesg
110.29
KB
-rw-r-----
dmesg.0
110.06
KB
-rw-r-----
dmesg.1.gz
23.44
KB
-rw-r-----
dmesg.2.gz
25.02
KB
-rw-r-----
dmesg.3.gz
24.61
KB
-rw-r-----
dmesg.4.gz
24.6
KB
-rw-r-----
dpkg.log
35.79
KB
-rw-r--r--
dpkg.log.1
49.85
KB
-rw-r--r--
dpkg.log.10.gz
5.12
KB
-rw-r--r--
dpkg.log.11.gz
3.25
KB
-rw-r--r--
dpkg.log.12.gz
4.51
KB
-rw-r--r--
dpkg.log.2.gz
3.07
KB
-rw-r--r--
dpkg.log.3.gz
1.59
KB
-rw-r--r--
dpkg.log.4.gz
3.18
KB
-rw-r--r--
dpkg.log.5.gz
2.82
KB
-rw-r--r--
dpkg.log.6.gz
4.16
KB
-rw-r--r--
dpkg.log.7.gz
5.57
KB
-rw-r--r--
dpkg.log.8.gz
4.06
KB
-rw-r--r--
dpkg.log.9.gz
4.79
KB
-rw-r--r--
faillog
31.59
KB
-rw-r--r--
fontconfig.log
2.73
KB
-rw-r--r--
kern.log
92.69
KB
-rw-r-----
kern.log.1
173
B
-rw-r-----
kern.log.2.gz
135
B
-rw-r-----
kern.log.3.gz
144
B
-rw-r-----
kern.log.4.gz
112
B
-rw-r-----
lastlog
107.32
GB
-rw-rw-r--
syslog
380.49
KB
-rw-r-----
syslog.1
408.17
KB
-rw-r-----
syslog.2.gz
47.73
KB
-rw-r-----
syslog.3.gz
46.45
KB
-rw-r-----
syslog.4.gz
50.7
KB
-rw-r-----
ubuntu-advantage-timer.log
7.81
KB
-rw-r--r--
ubuntu-advantage-timer.log.1
20.89
KB
-rw-r--r--
ubuntu-advantage-timer.log.2.g...
1.72
KB
-rw-r--r--
ubuntu-advantage-timer.log.3.g...
1.68
KB
-rw-r--r--
ubuntu-advantage-timer.log.4.g...
1.7
KB
-rw-r--r--
ubuntu-advantage-timer.log.5.g...
1.6
KB
-rw-r--r--
ubuntu-advantage-timer.log.6.g...
1.74
KB
-rw-r--r--
ubuntu-advantage.log
22.81
KB
-rw-r--r--
ubuntu-advantage.log.1
54.3
KB
-rw-r--r--
ubuntu-advantage.log.2.gz
2.38
KB
-rw-r--r--
ubuntu-advantage.log.3.gz
2.3
KB
-rw-r--r--
ubuntu-advantage.log.4.gz
2.44
KB
-rw-r--r--
ubuntu-advantage.log.5.gz
2.19
KB
-rw-r--r--
ubuntu-advantage.log.6.gz
2.4
KB
-rw-r--r--
vmware-network.1.log
195
B
-rw-r--r--
vmware-network.2.log
195
B
-rw-r--r--
vmware-network.3.log
195
B
-rw-r--r--
vmware-network.log
195
B
-rw-r--r--
vmware-vmsvc-root.1.log
3.01
KB
-rw-------
vmware-vmsvc-root.2.log
2.95
KB
-rw-------
vmware-vmsvc-root.3.log
2.25
KB
-rw-------
vmware-vmsvc-root.log
2
KB
-rw-------
vmware-vmtoolsd-root.log
13.9
KB
-rw-------
vsftpd.log
0
B
-rw-r-----
vsftpd.log.1
2.13
MB
-rw-r-----
vsftpd.log.2
5.55
MB
-rw-r-----
vsftpd.log.3
8.24
MB
-rw-r-----
vsftpd.log.4
512
B
-rw-r-----
wtmp
562.13
KB
-rw-rw-r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : ubuntu-advantage.log
["2026-02-01T10:25:43.448", "DEBUG", "root", "load_file", 356, "Reading file: /etc/os-release", {}] ["2026-02-01T10:25:43.451", "DEBUG", "root", "load_file", 356, "Reading file: /proc/version_signature", {}] ["2026-02-01T10:25:43.453", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-01T10:25:43.456", "DEBUG", "uaclient.files.files", "read", 55, "File does not exist: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-01T10:25:43.473", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/status.json", {}] ["2026-02-01T10:25:43.476", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-01T10:25:43.476", "DEBUG", "uaclient.files.files", "read", 55, "File does not exist: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-01T10:25:44.563", "DEBUG", "root", "load_file", 356, "Reading file: /run/ubuntu-advantage//aptnews.json", {}] ["2026-02-01T10:25:44.566", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['xenial'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-01T10:25:44.567", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['bionic'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-01T10:25:44.567", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['focal'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-01T10:25:44.567", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['jammy'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-01T10:25:44.567", "DEBUG", "root", "fetch_and_process_apt_news", 178, "using msg: None", {}] ["2026-02-02T17:52:40.079", "DEBUG", "root", "load_file", 356, "Reading file: /etc/os-release", {}] ["2026-02-02T17:52:40.082", "DEBUG", "root", "load_file", 356, "Reading file: /proc/version_signature", {}] ["2026-02-02T17:52:40.089", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-02T17:52:40.092", "DEBUG", "uaclient.files.files", "read", 55, "File does not exist: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-02T17:52:40.097", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/status.json", {}] ["2026-02-02T17:52:40.099", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-02T17:52:40.100", "DEBUG", "uaclient.files.files", "read", 55, "File does not exist: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-02T17:54:10.294", "DEBUG", "root", "load_file", 356, "Reading file: /run/ubuntu-advantage//aptnews.json", {}] ["2026-02-02T17:54:10.297", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['xenial'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-02T17:54:10.298", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['bionic'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-02T17:54:10.298", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['focal'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-02T17:54:10.298", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['jammy'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-02T17:54:10.298", "DEBUG", "root", "fetch_and_process_apt_news", 178, "using msg: None", {}] ["2026-02-03T03:05:10.564", "DEBUG", "root", "load_file", 356, "Reading file: /etc/os-release", {}] ["2026-02-03T03:05:10.568", "DEBUG", "root", "load_file", 356, "Reading file: /proc/version_signature", {}] ["2026-02-03T03:05:10.605", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/status.json", {}] ["2026-02-03T03:05:10.610", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-03T03:05:10.611", "DEBUG", "uaclient.files.files", "read", 55, "File does not exist: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-04T17:56:00.317", "DEBUG", "root", "load_file", 356, "Reading file: /etc/os-release", {}] ["2026-02-04T17:56:00.320", "DEBUG", "root", "load_file", 356, "Reading file: /proc/version_signature", {}] ["2026-02-04T17:56:00.329", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-04T17:56:00.331", "DEBUG", "uaclient.files.files", "read", 55, "File does not exist: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-04T17:56:00.345", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/status.json", {}] ["2026-02-04T17:56:00.348", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-04T17:56:00.349", "DEBUG", "uaclient.files.files", "read", 55, "File does not exist: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-04T17:58:11.020", "DEBUG", "root", "load_file", 356, "Reading file: /run/ubuntu-advantage//aptnews.json", {}] ["2026-02-04T17:58:11.024", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['xenial'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-04T17:58:11.025", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['bionic'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-04T17:58:11.025", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['focal'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-04T17:58:11.025", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['jammy'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-04T17:58:11.025", "DEBUG", "root", "fetch_and_process_apt_news", 178, "using msg: None", {}] ["2026-02-05T14:12:27.056", "DEBUG", "root", "load_file", 356, "Reading file: /etc/os-release", {}] ["2026-02-05T14:12:27.059", "DEBUG", "root", "load_file", 356, "Reading file: /proc/version_signature", {}] ["2026-02-05T14:12:27.098", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/status.json", {}] ["2026-02-05T14:12:27.101", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-05T14:12:27.101", "DEBUG", "uaclient.files.files", "read", 55, "File does not exist: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-06T03:51:10.269", "DEBUG", "root", "load_file", 356, "Reading file: /etc/os-release", {}] ["2026-02-06T03:51:10.272", "DEBUG", "root", "load_file", 356, "Reading file: /proc/version_signature", {}] ["2026-02-06T03:51:10.286", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/status.json", {}] ["2026-02-06T03:51:10.290", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-06T03:51:10.290", "DEBUG", "uaclient.files.files", "read", 55, "File does not exist: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-07T13:45:01.984", "DEBUG", "root", "load_file", 356, "Reading file: /etc/os-release", {}] ["2026-02-07T13:45:01.987", "DEBUG", "root", "load_file", 356, "Reading file: /proc/version_signature", {}] ["2026-02-07T13:45:01.993", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-07T13:45:01.996", "DEBUG", "uaclient.files.files", "read", 55, "File does not exist: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-07T13:45:02.001", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/status.json", {}] ["2026-02-07T13:45:02.004", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-07T13:45:02.004", "DEBUG", "uaclient.files.files", "read", 55, "File does not exist: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-07T13:45:47.249", "DEBUG", "root", "load_file", 356, "Reading file: /run/ubuntu-advantage//aptnews.json", {}] ["2026-02-07T13:45:48.112", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['xenial'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-07T13:45:48.112", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['bionic'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-07T13:45:48.113", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['focal'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-07T13:45:48.113", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['jammy'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-07T13:45:48.113", "DEBUG", "root", "fetch_and_process_apt_news", 178, "using msg: None", {}] ["2026-02-08T00:24:10.285", "DEBUG", "root", "load_file", 356, "Reading file: /etc/os-release", {}] ["2026-02-08T00:24:10.288", "DEBUG", "root", "load_file", 356, "Reading file: /proc/version_signature", {}] ["2026-02-08T00:24:10.302", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/status.json", {}] ["2026-02-08T00:24:10.305", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-08T00:24:10.305", "DEBUG", "uaclient.files.files", "read", 55, "File does not exist: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-09T02:06:10.264", "DEBUG", "root", "load_file", 356, "Reading file: /etc/os-release", {}] ["2026-02-09T02:06:10.266", "DEBUG", "root", "load_file", 356, "Reading file: /proc/version_signature", {}] ["2026-02-09T02:06:10.271", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-09T02:06:10.274", "DEBUG", "uaclient.files.files", "read", 55, "File does not exist: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-09T02:06:10.281", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/status.json", {}] ["2026-02-09T02:06:10.284", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-09T02:06:10.284", "DEBUG", "uaclient.files.files", "read", 55, "File does not exist: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-09T02:06:17.741", "DEBUG", "root", "load_file", 356, "Reading file: /run/ubuntu-advantage//aptnews.json", {}] ["2026-02-09T02:06:17.745", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['xenial'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-09T02:06:17.745", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['bionic'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-09T02:06:17.745", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['focal'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-09T02:06:17.745", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['jammy'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-09T02:06:17.746", "DEBUG", "root", "fetch_and_process_apt_news", 178, "using msg: None", {}] ["2026-02-10T14:54:40.676", "DEBUG", "root", "load_file", 356, "Reading file: /etc/os-release", {}] ["2026-02-10T14:54:40.679", "DEBUG", "root", "load_file", 356, "Reading file: /proc/version_signature", {}] ["2026-02-10T14:54:40.808", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/status.json", {}] ["2026-02-10T14:54:40.811", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-10T14:54:40.812", "DEBUG", "uaclient.files.files", "read", 55, "File does not exist: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-10T14:54:40.862", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-10T14:54:40.865", "DEBUG", "uaclient.files.files", "read", 55, "File does not exist: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-10T14:55:17.799", "DEBUG", "root", "load_file", 356, "Reading file: /run/ubuntu-advantage//aptnews.json", {}] ["2026-02-10T14:55:17.803", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['xenial'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-10T14:55:17.804", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['bionic'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-10T14:55:17.804", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['focal'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-10T14:55:17.804", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['jammy'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-10T14:55:17.804", "DEBUG", "root", "fetch_and_process_apt_news", 178, "using msg: None", {}] ["2026-02-11T01:49:10.318", "DEBUG", "root", "load_file", 356, "Reading file: /etc/os-release", {}] ["2026-02-11T01:49:10.320", "DEBUG", "root", "load_file", 356, "Reading file: /proc/version_signature", {}] ["2026-02-11T01:49:10.335", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/status.json", {}] ["2026-02-11T01:49:10.338", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-11T01:49:10.338", "DEBUG", "uaclient.files.files", "read", 55, "File does not exist: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-12T03:41:40.087", "DEBUG", "root", "load_file", 356, "Reading file: /etc/os-release", {}] ["2026-02-12T03:41:40.090", "DEBUG", "root", "load_file", 356, "Reading file: /proc/version_signature", {}] ["2026-02-12T03:41:40.096", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-12T03:41:40.099", "DEBUG", "uaclient.files.files", "read", 55, "File does not exist: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-12T03:41:40.105", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/status.json", {}] ["2026-02-12T03:41:40.108", "DEBUG", "root", "load_file", 356, "Reading file: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-12T03:41:40.108", "DEBUG", "uaclient.files.files", "read", 55, "File does not exist: /var/lib/ubuntu-advantage/private/machine-token.json", {}] ["2026-02-12T03:42:17.566", "DEBUG", "root", "load_file", 356, "Reading file: /run/ubuntu-advantage//aptnews.json", {}] ["2026-02-12T03:42:17.571", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['xenial'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-12T03:42:17.571", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['bionic'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-12T03:42:17.572", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['focal'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-12T03:42:17.572", "DEBUG", "root", "select_message", 151, "msg dates don't apply: AptNewsMessage{'begin': datetime.datetime(2025, 3, 25, 0, 0, tzinfo=datetime.timezone.utc), 'end': None, 'selectors': {'codenames': ['jammy'], 'clouds': None, 'pro': None}, 'lines': ['Patch available for a potential RCE vulnerability ', 'in FreeType, tracked by CVE-2025-27363.', 'For more see: https://ubuntu.com/security/CVE-2025-27363']}", {}] ["2026-02-12T03:42:17.572", "DEBUG", "root", "fetch_and_process_apt_news", 178, "using msg: None", {}]
Close