Hi Fantu, sorry for the delay but I was busy with other things. And I
cannot promise how quickly I can look into your improvements. In the end
I would prefer to have things the same in Debian and Ubuntu but
unfortunately this might be difficult. So it might happen that we have
to keep things more
Not here, still seeing the same problem, and not just with vsftpd:
No LSB modules are available.
Distributor ID: Ubuntu
Description:Ubuntu 14.04 LTS
Release:14.04
Codename: trusty
Linux ip-10-0-0-46 3.13.0-27-generic #50-Ubuntu SMP Thu May 15 18:06:16
UTC 2014 x86_64 x86_64
This bug was fixed in the package convoy - 0.2.1+bzr25-3
Sponsored for Logan Rosen (logan)
---
convoy (0.2.1+bzr25-3) unstable; urgency=low
* Add missing autopkgtest dependencies on python-mocker and python-
paste.
-- Jelmer Vernooij jel...@debian.org Mon, 26 May 2014
This bug was fixed in the package parsedatetime - 1.2-1
Sponsored for Jackson Doak (noskcaj)
---
parsedatetime (1.2-1) unstable; urgency=medium
* Team upload.
[ Jakub Wilk ]
* Use canonical URIs for Vcs-* fields.
[ Jackson Doak ]
* Sync from ubuntu. Closes: #485054
Which software also has this problem?
04 июня 2014 г. 11:51 пользователь Joel j...@saldino.net написал:
Not here, still seeing the same problem, and not just with vsftpd:
No LSB modules are available.
Distributor ID: Ubuntu
Description:Ubuntu 14.04 LTS
Release:14.04
Codename:
This works:
Linux ip-10-0-0-46 3.15.0-031500rc2-generic #201404201435 SMP Sun Apr 20
18:36:18 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux
From:
http://www.deinon.com/wiki/doku.php?id=linux:ubuntu
How stable is this and can it be trusted for production use?
--
You received this bug notification
This bug was fixed in the package parsedatetime - 1.2-1
---
parsedatetime (1.2-1) unstable; urgency=medium
* Team upload.
[ Jakub Wilk ]
* Use canonical URIs for Vcs-* fields.
[ Jackson Doak ]
* Sync from ubuntu. Closes: #485054 #717991
* Bump standards-version to
Problem 1:3.7-1 nbd-server_1:3.7-1_i386.deb ubuntu trusty
authorization file:
192.168.3.28
In syslog:
connect from 192.168.3.28, assigned file is /opt/ltsp/images/i386.img
Client '192.168.3.28' is not authorized to access
Child exited with 1
--
You received this bug notification because you
No, nothing has changed in Ubuntu's udev wrt. to that. Debian's udev
also does not use the rdma group any more, so the group should instead
be dropped in Debian as well. We really don't want all these extra
device permissions group creep back into Ubuntu. They are evil, bad,
and wrong...
Here are the steps to install the 12.10 binaries on 12.04:
% wget
http://launchpadlibrarian.net/108979339/network-manager-strongswan_1.3.0-0ubuntu1_amd64.deb
% wget
http://launchpadlibrarian.net/108979332/strongswan-nm_4.5.2-1.5ubuntu2_amd64.deb
% wget
This is blocking me from creating Trusty images for Openstack. Is there
a workaround for this, and/or will the fix be backported to Trusty?
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cloud-init in Ubuntu.
** Also affects: cloud-init (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cloud-init in Ubuntu.
https://bugs.launchpad.net/bugs/1068756
Title:
IPv6 Privacy Extensions enabled on
Tested OK - marking verification-done
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to ceph in Ubuntu.
https://bugs.launchpad.net/bugs/1322498
Title:
Unable to
Neil: the metadata is just one example (though that's not happening).
The firewall rule thing applies irrespective of the metadata. The cloud
environment created requires only /128 addresses it knows about to be
accessible, and firewalls everything else out. Reasons for this include
prevention of
Blueprint changed by Robie Basak:
Work items changed:
- Work items:
+ Work items for ubuntu-14.06:
+ [racb] Early cycle merge report: TODO
+
+ Work items for ubuntu-14.08:
+ [racb] Late cycle merge report: TODO
+
+ Work items for ubuntu-14.10:
determine ssd caching solution (bcache is it):
Thank you for taking the time to report this bug and helping to make
Ubuntu better.
I specifically tested vsftpd local user login in Trusty by adding a dep8
test that automatically tests this case. You can see the test case here:
http://bazaar.launchpad.net/~ubuntu-branches/ubuntu/trusty/vsftpd
Thanks!
** Also affects: haproxy (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=750459
Importance: Unknown
Status: Unknown
** Tags removed: needs-upstream-report
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is
There's no problem with using it in an IPv6 environment if you use
IPv6 prefix mechanisms as designed
If you've tied down your cloud environment too tight (and technically
contra the spec - IPv6 is prefix based, not address based) then you
have to expect to make alterations to the standard
Trusty fix uploaded with adding missing bug ref in changelog. Thanks!
Unsubscribing sponsors, everything has been uploaded. ubuntu-sru team
will take it from here, or subscribe ubuntu-sponsors again if there's
updated things to upload.
--
You received this bug notification because you are a
Utopic fix uploaded with adding missing bug ref in changelog. Thanks!
** No longer affects: autofs5 (Ubuntu Saucy)
** No longer affects: autofs5 (Ubuntu Trusty)
** No longer affects: autofs (Ubuntu Precise)
** Changed in: autofs (Ubuntu)
Status: In Progress = Fix Committed
** Changed
Blueprint changed by Serge Hallyn:
Work items changed:
Work items:
[stgraber] Shorten the cgroup path in logind so we don't get too much of a
performance impact: TODO
[stgraber] Update lxc-start-ephemeral to use the clone function: TODO
[serge-hallyn] Investigate the syslog namespace and
This affects 14.04 too
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cloud-init in Ubuntu.
https://bugs.launchpad.net/bugs/1068756
Title:
IPv6 Privacy Extensions enabled on Ubuntu Server by default
To manage notifications about
That doesn't work if (for instance) you have 2 machines on the same SDN
virtual LAN, which is a /64, and you want to prevent source spoofing
between them. For avoidance of doubt, we do use /64s.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is
** Changed in: juju-core (Ubuntu)
Status: Triaged = In Progress
** Changed in: juju-core (Ubuntu)
Assignee: (unassigned) = Robie Basak (racb)
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
** Changed in: juju-core (Ubuntu)
Status: Triaged = In Progress
** Changed in: juju-core (Ubuntu)
Assignee: (unassigned) = Robie Basak (racb)
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
** Also affects: juju-core (Ubuntu)
Importance: Undecided
Status: New
** Changed in: juju-core (Ubuntu)
Status: New = In Progress
** Changed in: juju-core (Ubuntu)
Assignee: (unassigned) = Robie Basak (racb)
--
You received this bug notification because you are a member
Hello Rafael, or anyone else affected,
Accepted autofs into trusty-proposed. The package will build now and be
available at http://launchpad.net/ubuntu/+source/autofs/5.0.7-3ubuntu3.1
in a few hours, and then in the -proposed repository.
Please help us by testing this new package. See
** Branch linked: lp:ubuntu/utopic-proposed/autofs
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to autofs in Ubuntu.
https://bugs.launchpad.net/bugs/1316125
Title:
Autofs leak file descriptors when reloaded (-HUP) and daemon may
Public bug reported:
Using apache2 lucid 64bit; when reloading get this warning message:
[Wed Jun 04 16:12:40 2014] [warn] worker http://127.0.0.1:8180 already used by
another worker
https://issues.apache.org/bugzilla/show_bug.cgi?id=44350
Thanks guys!!!
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to autofs in Ubuntu.
https://bugs.launchpad.net/bugs/1316125
Title:
Autofs leak file descriptors when reloaded (-HUP) and daemon may stop
working on high # of
The problem can occur with any application as stated by Boris Ostrovsky
This can be easily triggered by Linux' page-types
(tools/vm/page-types.c) after save/restore.
All it does is it walks the page tables (in fs/proc/task_mmu.c) and
eventually trips on bad page. For example:
#
I've been using 3.15.0-031500rc2-generic #201404201435 SMP Sun Apr 20
18:36:18 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux from the Ubuntu
Mainline kernel PPA on all my Xen guests for weeks without issue.
Looks like the patch is scheduled for the 3.13.11.3 kernel update.
Ref:
** Branch linked: lp:ubuntu/trusty-proposed/autofs
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to autofs in Ubuntu.
https://bugs.launchpad.net/bugs/1316125
Title:
Autofs leak file descriptors when reloaded (-HUP) and daemon may
I would suggest that is a design flaw in your network - which is
working in an IPv4 manner, not an IPv6 one. You should have used a
prefix smaller than /64
The problem here is with the network design, not the image.
On 4 June 2014 14:40, Alex Bligh ubu...@alex.org.uk wrote:
That doesn't work if
This bug was fixed in the package autofs - 5.0.7-3ubuntu5
---
autofs (5.0.7-3ubuntu5) utopic; urgency=medium
* Fix file descriptor leak when reloading daemon. (LP: #1316125)
-- Rafael David Tinoco rafael.tin...@canonical.com Thu, 15 May 2014
18:05:40 -0300
** Changed in:
Public bug reported:
The mysql-server-5.6 installs two init-scripts: an upstart and a
sysvinit one:
* /etc/init/mysql.conf
* /etc/init.d/mysql
Ubuntu uses upstart to manage the mysql-daemon, but this doesn't keep
users from using /etc/init.d/mysql. This leads to confusing (and
dangerous?)
PID=$(sed -n 's/^\s*pid\s\s*\([^;]*\).*/\1/p' /etc/nginx/nginx.conf)
works for the three testcases shown in this and linked bugs.
not sure why I cant use \s+ after pid in the expression above, but it
works this way.
** Bug watch added: Debian Bug tracker #747329
** No longer affects: walinuxagent (Ubuntu Precise)
** No longer affects: walinuxagent (Ubuntu Trusty)
** Summary changed:
- [SRU] Update walinuxagent package to v2.0.5
+ Update walinuxagent package to v2.0.5
--
You received this bug notification because you are a member of Ubuntu
Server
Hello Stephen, or anyone else affected,
Accepted walinuxagent into trusty-proposed. The package will build now
and be available at
http://launchpad.net/ubuntu/+source/walinuxagent/2.0.5-0ubuntu2~14.04.0
in a few hours, and then in the -proposed repository.
Please help us by testing this new
Hello Stephen, or anyone else affected,
Accepted walinuxagent into precise-proposed. The package will build now
and be available at
http://launchpad.net/ubuntu/+source/walinuxagent/2.0.5-0ubuntu2~12.04.0
in a few hours, and then in the -proposed repository.
Please help us by testing this new
** Changed in: nginx (Debian)
Status: Unknown = New
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nginx in Ubuntu.
https://bugs.launchpad.net/bugs/1314740
Title:
init script pid parsing has failure cases
To manage
Public bug reported:
$ charm get ntp
You have not informed bzr of your Launchpad ID, and you must do this to
write to Launchpad or access private data. See bzr help launchpad-login.
You have not informed bzr of your Launchpad ID, and you must do this to
** Also affects: nova (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1322243
Title:
VMware Driver nova.virt.driver [-] Unable to
** Changed in: haproxy (Debian)
Status: Unknown = New
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to haproxy in Ubuntu.
https://bugs.launchpad.net/bugs/1325847
Title:
Improvement: initscript enhancement with support for
Public bug reported:
There's a bug fixed in krb5 1.12.1+dfsg-2 (just uploaded to Debian) where if a
gss-api mechanism is dynamically loaded, and that mechanism uses symbols from
libgssapi_krb5, and doesn't provide certain optional entry points added in krb5
1.12, then calling one of those
Marking confirmed because I started tracking this down based on a report
to the Moonshot project from Rhys Smith which ended up being this issue.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to krb5 in Ubuntu.
** Branch linked: lp:~hartmans/ubuntu/trusty/krb5/gss-infinite-loop
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to krb5 in Ubuntu.
https://bugs.launchpad.net/bugs/1326500
Title:
libgssapi-krb5-2: segfault when mechglue loops
How about grabbing this commit from browserid:
commit e51f544e6c0b92c88163d1b0f4ae110869abf070
Author: Luke Howard lu...@padl.com
Date: Thu Oct 24 18:10:24 2013 -0700
add gss_{acquire,add}_cred_from
--
You received this bug notification because you are a member of Ubuntu
Server Team,
Luke == Luke Howard lu...@padl.com writes:
Luke How about grabbing this commit from browserid: commit
Luke e51f544e6c0b92c88163d1b0f4ae110869abf070 Author: Luke Howard
Luke lu...@padl.com Date: Thu Oct 24 18:10:24 2013 -0700
That's something to consider for the specific case of
I've built the linked branch in ppa:hartmans/ubuntu-fixes for trusty.
With these packages installed and the attached radsec.conf installed as
/usr/local/etc/radsec.conf, then gss-server starts correctly as expected.
Without radsec.conf installed it prints an error about being unable to acquire
Oh, this is routine tested, nice!
It really looked like the Debian bug, but, as it turns out, it was probably
caused by an outdated (or broken) vsftpd package from thefrontiergroup's PPA.
Purging the package and reinstalling the official one fixed the issue. Thank
you Robie!
** Changed in:
Here's the patch from debian krb5 1.12.1+dfsg-2
** Patch added: 0014-Do-not-loop-on-add_cred_from-and-other-new-methods.patch
https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1326500/+attachment/4125522/+files/0014-Do-not-loop-on-add_cred_from-and-other-new-methods.patch
--
You received
Public bug reported:
When libvirt configures / starts up dnsmasq on the host, it does not
pass --no-hosts, resulting in it reading in the /etc/hosts file from the
host.
The default ubuntu setup will have the host's hostname in /etc/hosts
under 127.0.1.1. Since libvirt's dnsmasq is reading this
Hi Ryan,
Yep, I read the upstream bug and understand the explanation. I was just
surprised to see the bug fixed and I assumed it meant the error should
go away completely.
In my case the error happens from Postfix - Cyrus SASL - PAM - LDAP
(all stock packages including stock LDAP client
Blueprint changed by Patricia Gaughen:
Work items changed:
Work items for ubuntu-14.06:
[racb] Early cycle merge report: TODO
Work items for ubuntu-14.08:
[racb] Late cycle merge report: TODO
+ [smoser] add simplestreams data to ubuntu core images: TODO
Work items for
** Changed in: keystone/folsom
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to keystone in Ubuntu.
https://bugs.launchpad.net/bugs/1166670
Title:
[OSSA 2013-011] Deleted user can still
** Changed in: keystone/essex
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to keystone in Ubuntu.
https://bugs.launchpad.net/bugs/1064914
Title:
[OSSA-2012-018] Removing user from a tenant
** Tags added: patch
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to krb5 in Ubuntu.
https://bugs.launchpad.net/bugs/1326500
Title:
libgssapi-krb5-2: segfault when mechglue loops endlessly on call to
gss_add_cred_from
To manage
** Changed in: nova/icehouse
Milestone: 2014.1.1 = None
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1297962
Title:
[sru] Nova-compute doesnt start
To manage notifications
err.. i mean invalid
** Changed in: nova
Status: Confirmed = Invalid
** Changed in: libvirt (Ubuntu)
Status: Confirmed = Invalid
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to libvirt in Ubuntu.
The attachment 0014-Do-not-loop-on-add_cred_from-and-other-new-
methods.patch seems to be a patch. If it isn't, please remove the
patch flag from the attachment, remove the patch tag, and if you are
a member of the ~ubuntu-reviewers, unsubscribe the team.
[This is an automated message performed
61 matches
Mail list logo