Public bug reported:
Binary package hint: unixodbc
on the update, this error appeared.
ProblemType: Package
DistroRelease: Ubuntu 10.04
Package: odbcinst1debian1 2.2.11-21
ProcVersionSignature: Ubuntu 2.6.32-21.32-generic 2.6.32.11+drm33.2
Uname: Linux 2.6.32-21-generic x86_64
Accepted eucalyptus into lucid-proposed, the package will build now and
be available in a few hours. Please test and give feedback here. See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to
enable and use -proposed. Thank you in advance!
** Changed in: eucalyptus (Ubuntu
Accepted eucalyptus into lucid-proposed, the package will build now and
be available in a few hours. Please test and give feedback here. See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to
enable and use -proposed. Thank you in advance!
** Changed in: eucalyptus (Ubuntu
Public bug reported:
I'm trying to upgrade workstations to lucid an fails to access our
kerberos enabled websites. It reveals that the krb5 implementation in
lucid now tries to resolve the reverse dns and aquire a tikket for
service/reverse dns instead of service/what the user typed in the
first
Since the problem is in the clientside kerberos libraries it affects all
kerberos enabled stuff.
--
krb5 prefers the reverse pointer no matter what for locating service tickets.
https://bugs.launchpad.net/bugs/571572
You received this bug notification because you are a member of Ubuntu
Server
** Branch linked: lp:ubuntu/lucid-proposed/eucalyptus
--
[SRU] [scalability] NC does not detach created pthreads in KVM driver
https://bugs.launchpad.net/bugs/567371
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to eucalyptus in ubuntu.
** Branch linked: lp:ubuntu/lucid-proposed/eucalyptus
--
[SRU] euca-get-console-output gives first 64k of output, not most recent
https://bugs.launchpad.net/bugs/566793
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to eucalyptus in ubuntu.
** Branch linked: lp:ubuntu/lucid-proposed/eucalyptus
--
[SRU] [scalability] walrus reports java.lang.OutOfMemoryError: Java heap space
https://bugs.launchpad.net/bugs/565101
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to eucalyptus in
Updated text with:
== NSS resolution breaks with LDAP over SSL in Ubuntu Server ==
Upgrading systems configured to use LDAP via SSL as the first service in
the NSS stack (in /etc/nsswitch.conf) leads to broken NSS resolution
afterwards such that `setuid` applications like `sudo` would stop
Anyone who can test the proposed package? If not, the proposed update
will be removed again. Thanks!
--
sybase_* functions missing in php5-sybase for hardy
https://bugs.launchpad.net/bugs/240519
You received this bug notification because you are a member of Ubuntu
Server Team, which is
Anyone who can test the proposed package?
--
[Hardy] overzealous masquerading affects vm to vm traffic
https://bugs.launchpad.net/bugs/227837
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to libvirt in ubuntu.
--
Ubuntu-server-bugs
Anyone who can test the proposed package? If not, the proposed update
will be removed again. Thanks!
--
[SRU]nut init script reports incorrect status
https://bugs.launchpad.net/bugs/416182
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to
No feedback for half a year, I removed the proposed package.
2010-04-29 09:21:13 INFORemoving candidates:
2010-04-29 09:21:13 INFOipsec-tools 1:0.7-2.1ubuntu1.9.04.2 in jaunty
2010-04-29 09:21:13 INFOipsec-tools 1:0.7-2.1ubuntu1.9.04.2 in jaunty
amd64
2010-04-29 09:21:13 INFO
You have been subscribed to a public bug:
Binary package hint: rhythmbox
rhythmbox crashes when trying to access the Ubuntu One music store.
ProblemType: Crash
Architecture: i386
Date: Sun Feb 28 16:05:20 2010
DistroRelease: Ubuntu 10.04
EcryptfsInUse: Yes
ExecutablePath: /usr/bin/rhythmbox
This is a bug in winbind, so assigning to samba package
** Package changed: rhythmbox-ubuntuone-music-store (Ubuntu) = samba
(Ubuntu)
--
rhythmbox crashed with SIGSEGV in _nss_wins_gethostbyname_r()
https://bugs.launchpad.net/bugs/529714
You received this bug notification because you are a
Tried.. had that before.. but doesn't work any more. (and isn't
documented in man krb5.conf either).
--
krb5 prefers the reverse pointer no matter what for locating service tickets.
https://bugs.launchpad.net/bugs/571572
You received this bug notification because you are a member of Ubuntu
Mathias: your proposed branch does not apply the cleanup if you upgrade
from 0ubuntu5, is it on purpose ?
I propose that instead: lp:~ttx/ubuntu/lucid/openldap/cleanup-olcaccess
--
slapd 2.4.21-0ubuntu5 corrupts olcDatabase={-1}frontend.ldif with duplicate
olcAccess lines (again)
This bug was introduced in karmic, so upgrade from karmic to lucid shouldn't be
affected.
But for instance all upgrades from last LTS release (not only Ubuntu Server)
will get affected.
** Changed in: ubuntu-release-notes
Status: Fix Released = Confirmed
--
NSS using LDAP+SSL breaks
Correct, `passwd` works with likewise-open on hardy, and fails with winbind on
lucid.
I do not know what the outcome of `passwd` is on hardy without likewise-open,
nor
the outcome of `passwd` on lucid with likewise-open.
I will ask this on the Lucid forum at
I don't see that this requires any changes to the release notes text,
though.
** Changed in: ubuntu-release-notes
Status: Confirmed = Fix Released
--
NSS using LDAP+SSL breaks setuid applications like su and sudo
https://bugs.launchpad.net/bugs/423252
You received this bug notification
** Bug watch added: Debian Bug tracker #566351
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566351
** Also affects: libgcrypt11 (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566351
Importance: Unknown
Status: Unknown
--
NSS using LDAP+SSL breaks setuid
Mathias, Thierry: neither of these scripts appear to clean up the
olcAuthzRegexp:
gidNumber=\[\[:digit:]]\+\\\+uidNumber=0,cn=peercred,cn=external,cn=auth
cn=localroot,cn=config'
line that got added to the ${SLAPD_CONF}/cn=config.ldif file by earlier
upgrades. I believe that as long as
Yes, it is reproducible.
Preconditions:
* an LVM group named leo02
* PWD were you can write...
The following steps should do it, assuming a LVM group leo02:
sudo lvcreate /dev/leo02 --name kvm-test01 --size 5G
sudo vmbuilder kvm ubuntu --addpkg=openssh-server --addpkg=unattended-upgrades,
I think it will not be very easy to integrate virConnectNumOfInterface
function. In fact, this function need libnetcf (a library to manage
network config via XML), and libnetcf compile fine under ubuntu but
libnetcf is created under the fedora network scheme configuration and it
is not compatible
On Thu, Apr 29, 2010 at 02:57:36 -, Stephen Warren wrote:
Re: the mention of symptoms in comment #12 above: My symptom was that I
could not log in at all, and in existing sessions, sudo wouldn't work
etc. I store user information in LDAP, with just system users in
/etc/passwd etc., so
** Changed in: libgcrypt11 (Debian)
Status: Unknown = Confirmed
--
NSS using LDAP+SSL breaks setuid applications like su and sudo
https://bugs.launchpad.net/bugs/423252
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to libnss-ldap in
I tried 4-5-your proposed 5.1 and ended up with:
olcDatabase: {0}config
olcAccess: {0}to * by dn.exact=gidNumber=0+uidNumber=0,...
olcAccess: {0}to * by dn.exact=gidNumber=0+uidNumber=0,...
--
slapd 2.4.21-0ubuntu5 corrupts olcDatabase={-1}frontend.ldif with duplicate
olcAccess lines
As commented by Nathan on comment 10, should we also remove the
olcAuthzRegexp line mentioning localroot from the
/etc/ldap/slapd.d/cn=config.ldif file ?
--
slapd 2.4.21-0ubuntu5 corrupts olcDatabase={-1}frontend.ldif with duplicate
olcAccess lines (again)
https://bugs.launchpad.net/bugs/571057
When you say still log in as root to fix this, did you have to make
additional edits after you got slapd running again (as you mentioned in
your original problem description)? That is, were you locked out just
because slapd wasn't running, and then back to normal again once you got
slapd
*** This bug is a duplicate of bug 463684 ***
https://bugs.launchpad.net/bugs/463684
https://help.ubuntu.com/9.04/serverguide/C/openldap-server.html
This documentation is still outdated when it comes to installing it. The
script does NOT request a password still?
Any updates as to when
https://help.ubuntu.com/9.04/serverguide/C/openldap-server.html
This documentation is still outdated when it comes to installing it. The
script does NOT request a password still?
Any updates as to when this document might be updated?
I would suggest making these docs. more wiki-like Then,
On Thu, Apr 29, 2010 at 10:23 AM, atom88 adam.hi...@gmail.com wrote:
https://help.ubuntu.com/9.04/serverguide/C/openldap-server.html
This documentation is still outdated when it comes to installing it. The
script does NOT request a password still?
Any updates as to when this document might
Public bug reported:
As a result of LP: #427842, the initial configuration created upon installation
of slapd 2.4.21-0ubuntu4 and later will include the following ACLs on the
{-1}frontend database:
olcAccess: to dn.base= by * read
olcAccess: to dn.base=cn=subschema by * read
However, when
** Changed in: ubuntu-release-notes
Status: Confirmed = Fix Committed
** Changed in: ubuntu-release-notes
Assignee: (unassigned) = Thierry Carrez (ttx)
--
slapd 2.4.21-0ubuntu5 corrupts olcDatabase={-1}frontend.ldif with duplicate
olcAccess lines (again)
The Kerberos Consortium has a paper on integrating Kerberos into an
application; see http://www.kerberos.org/software/appskerberos.pdf .
I believe that the lucid behavior is correct according to MIT's
documentation: what should be happening is that
* with rdns=true (default), both forward and
Hi Sam.
I agree.. the current behaviors seems to be excactly what is in the code
and in the documentation.
Never the less it is a change from earlier versions of Ubuntu and a
change that makes Ubuntu + Firefox work in a different way than MS
Windows + MSIE (negoiating different tickets), thus
** Visibility changed to: Public
--
apache2 crashed with SIGSEGV in zend_hash_graceful_reverse_destroy()
https://bugs.launchpad.net/bugs/571430
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to apache2 in ubuntu.
--
Ubuntu-server-bugs
I have opened Bug #571752 for the issue related to missing ACLs for the
frontend database after upgrading from earlier versions of slapd
(discussed in comments 3 12 here).
(Obviously, the discussion related to the issue mentioned in comment 11
here has moved to Bug #571057.)
--
olcAccess are
*** This bug is a duplicate of bug 427842 ***
https://bugs.launchpad.net/bugs/427842
Note that the fix committed as part of bug #427842 only changed the
settings for new installations, while this bug is actually about
permission problems after migrating from an earlier version of the slapd
Jesper Krogh jes...@krogh.cc writes:
Never the less it is a change from earlier versions of Ubuntu and a
change that makes Ubuntu + Firefox work in a different way than MS
Windows + MSIE (negoiating different tickets), thus breaking Single
Signon in typical Kerberos enabled environments.. our
Well, everything should work fine if you make your DNS consistent.
Honestly if I was going to make a behavior change here I'd have Firefox
call gss_import_name with a name type that does not involve resolution.
--Sam
--
krb5 prefers the reverse pointer no matter what for locating service
Sam Hartman hartm...@debian.org writes:
Well, everything should work fine if you make your DNS consistent.
Honestly if I was going to make a behavior change here I'd have Firefox
call gss_import_name with a name type that does not involve resolution.
The main place where you cannot make DNS
Thierry, any chance of of adding another release note covering the post-
upgrade access permissions problems discussed here and in bug #571752?
Even though they won't cause the upgrade process to abort the way the
ordered_value_sort error does, it still seems pretty significate that
some LDAP
*** This bug is a duplicate of bug 361754 ***
https://bugs.launchpad.net/bugs/361754
The error vcpu not ready for apic_round_robin can also occur if a
guest is timing out for other reasons...like not enough RAM allocated. I
have examples of this occuring on a hardy 8.04 LTS system with KVM
*** This bug is a duplicate of bug 463684 ***
https://bugs.launchpad.net/bugs/463684
Thanks Phil for the info. I'll look into becoming a contributor, etc.
I found this how-to that solved my problem:
http://www.howtoforge.com/install-and-configure-openldap-on-ubuntu-karmic-koala
Perhaps if
Jesper == Jesper Krogh jes...@krogh.cc writes:
Jesper Hi Russ. I cannot say anything about what other are
Jesper Would a patch that makes the behaviour configurable be
Jesper acceptable?
I think that this patch should be accepted only if upstream is
interested in the patch. Given
In terms of work arounds, if your KDC is an AD KDc, you can add the
final hostnames as ServicePrincipalName attributes on AD for the account
in question. That should make things work either for a Windows server
or for a 1.7+ MIT server.
If your KDC is Unix you can add principals for the final
I agree that it is a partial workaround.. it fixes the Ubuntu/Firefox + apache
combination.
But without changing the same thing for all the IIS servers it would still
render my Ubuntu/Firefox + IIS SSO broken.
Since I only administrate the Linux stuff, and the other side
genereally are very
** Tags added: patch
--
permission denied on /var/run/named/named.stats
https://bugs.launchpad.net/bugs/570936
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to bind9 in ubuntu.
--
Ubuntu-server-bugs mailing list
You have been subscribed to a public bug:
Installed under 10.04
ProblemType: Package
DistroRelease: Ubuntu 10.04
Package: bacula-director-mysql 5.0.1-1ubuntu1
ProcVersionSignature: Ubuntu 2.6.32-21.32-generic 2.6.32.11+drm33.2
Uname: Linux 2.6.32-21-generic i686
Architecture: i386
Date: Thu Apr
You have been subscribed to a public bug:
Installed a dual core processor on a old emachine managed to fix windows
but I'm not able to install any of the upgrades and I'm unable to close
the window. Have 3.19 version of Ubuntu currently installed.
ProblemType: Package
Architecture: i386
Date:
Public bug reported:
the installation of dovecot-postfix inserts '/usr/lib/dovecot/deliver -c
/etc/dovecot/conf.d/dovecot.conf -n -m ${EXTENSION}' into main.cf of
the postfix config file as the 'mailbox command'. Unfortunately the
config file location that dovecot defaults to is
** Package changed: ubuntu = bacula (Ubuntu)
--
package bacula-director-mysql 5.0.1-1ubuntu1 failed to install/upgrade:
underprocess installerade post-installation-skript gav felkod 1
https://bugs.launchpad.net/bugs/568341
You received this bug notification because you are a member of Ubuntu
** Package changed: ubuntu = krb5 (Ubuntu)
--
Unable to install any updates after cpu upgrade
https://bugs.launchpad.net/bugs/542373
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to krb5 in ubuntu.
--
Ubuntu-server-bugs mailing list
Public bug reported:
Binary package hint: bind9
1. Ubuntu version:
Description:Ubuntu 10.04 LTS
Release:10.04
2. Package versions for libdns64, dnsutils and bind9. I'm not sure which is the
real cause of this.
libdns64:
Installed: 1:9.7.0.dfsg.P1-1
** Attachment added: Dependencies.txt
http://launchpadlibrarian.net/46411331/Dependencies.txt
--
bind9 installation and dnsutils binaries crash due to libdns.so.64
https://bugs.launchpad.net/bugs/571960
You received this bug notification because you are a member of Ubuntu
Server Team, which
Ran two sequences, one before and one after aplying the packages in
-proposed. Both of them are logged in lp:~hggdh2/+junk/uec-
qa/lucid/proposed/euca-1.6.2-0ubuntu30.1.
No OOM on the after-maintenance run, on a 2,000 instances run. No new
errors. Fix verified.
--
[SRU] [scalability] walrus
I too have run into this issue. 9.10 this was fine, 10.04 mount.cifs
requires the setuid bit before allowing users to do this w/o sudo
privileges. This may be a packaging regression?
--
mount.cifs won't mount shares; set uid bit not set
https://bugs.launchpad.net/bugs/563805
You received this
58 matches
Mail list logo