[Bug 2042744] Re: su -s /bin/sh -c "keystone-manage db_sync" keystone

2024-03-11 Thread Jeremy Stanley
When switching a bug's type from Public to Public Security, please clarify what about it leads you to suspect it represents an exploitable vulnerability. I'm switching it back to a regular Public bug in the meantime. If this was triggered by the earlier mention of a use-after-free condition, it

[Bug 1452641] Re: Static Ceph mon IP addresses in connection_info can prevent VM startup

2021-10-19 Thread Jeremy Stanley
Please don't set OpenStack bugs to Public Security without some explanation as to why you believe this to be an exploitable risk which needs attention from the OpenStack vulnerability managers for coordinating a possible security advisory. I'm switching this back to a normal Public bug for now,

[Bug 1939733] Re: [OSSA-2021-005] Arbitrary dnsmasq reconfiguration via extra_dhcp_opts (CVE-2021-40085)

2021-10-11 Thread Jeremy Stanley
Slawek is one of the upstream Neutron developers. One of the Ubuntu package maintainers will need to take care of Ubuntu's package updates. It's probably mildly confusing that this bug report is marked as affecting the upstream project (where it's been fixed for months) but also the Ubuntu

[Bug 1940450] Re: XSS The data-template attribute of the tooltip and popover plugins lacks input sanitization and may allow attacker to execute arbitrary JavaScript.

2021-08-25 Thread Jeremy Stanley
I too am entirely out of my comfort zone with Javascript, so my level of certainty is low, based solely on the text of CVE-2019-8331 which says (all?) Bootstrap versions prior to 3.4.1 are affected. I also did not check the rdepends for python3-xstatic-bootstrap-scss in Ubuntu and perhaps

[Bug 1855080] Re: [OSSA-2019-006] Credentials API allows listing and retrieving of all users credentials (CVE-2019-19687)

2020-05-22 Thread Jeremy Stanley
** Summary changed: - Credentials API allows listing and retrieving of all users credentials + [OSSA-2019-006] Credentials API allows listing and retrieving of all users credentials (CVE-2019-19687) -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 1613423] Re: Mitaka + Trusty (kernel 3.13) not using apparmor capability by default, when it does, live migration doesn't work (/tmp/memfd-XXX can't be created)

2020-02-28 Thread Jeremy Stanley
** Description changed: - This issue is being treated as a potential security risk under embargo. - Please do not make any public mention of embargoed (private) security - vulnerabilities before their coordinated publication by the OpenStack - Vulnerability Management Team in the form of an

[Bug 1533724] Re: [SRU] keystone-signing folders fill /tmp and seriously slow down reboots

2020-02-28 Thread Jeremy Stanley
** Information type changed from Private to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1533724 Title: [SRU] keystone-signing folders fill /tmp and seriously slow down reboots To manage

[Bug 1855080] Re: Credentials API allows listing and retrieving of all users credentials

2019-12-06 Thread Jeremy Stanley
Just to get confirmation, this bug was only introduced as of Stein, right? It's not present in Rocky or earlier? Gage, assuming the above is true, and if nobody has any other concerns about your proposed impact description in comment #17, you can probably go ahead and request a CVE assignment for

[Bug 1855080] Re: Credentials API allows listing and retrieving of all users' credentials

2019-12-05 Thread Jeremy Stanley
Somewhat of a grammar nit on the updated title, but it would be "every user's" or "all users'" (placement of the apostrophe in possessive nouns is significant for indicating plurality, and "every" modifies a singular noun as opposed to "all" which modifies a plural). This nuance in the English

[Bug 1855080] Re: Credentials API allows listing and retrieving of all user's credentials

2019-12-05 Thread Jeremy Stanley
Daniel, is there any organization you want credited along with you for reporting this defect? Gage, I think the use of "user's" in the title (copied from the report itself) incorrectly suggests that a user only has access to credentials for their own user rather than, as the description explains,

[Bug 1855080] Re: Credentials API allows listing and retrieving of all user's credentials

2019-12-04 Thread Jeremy Stanley
The OpenStack VMT will request a CVE assignment from MITRE once we agree on a complete impact description for this report. If you're interested in the details of our report handling processes, you can find them here: https://security.openstack.org/vmt-process.html#process ** Description changed:

[Bug 1818239] Re: scheduler: build failure high negative weighting

2019-09-13 Thread Jeremy Stanley
Since this has come up again in bug 1581977 as representing a security- related concern, I'm adding the security bugtag to it for increased visibility. Note this is not the same as treating it as a security vulnerability, and I don't have the impression that any CVE assignment or security advisory

[Bug 1813007] Re: [SRU] Unable to install new flows on compute nodes when having broken security group rules (CVE-2019-10876)

2019-04-10 Thread Jeremy Stanley
** Changed in: ossa Status: Confirmed => Fix Released ** Summary changed: - [SRU] Unable to install new flows on compute nodes when having broken security group rules (CVE-2019-10876) + [SRU] [OSSA-2019-002] Unable to install new flows on compute nodes when having broken security group

[Bug 1813007] Re: [SRU] Unable to install new flows on compute nodes when having broken security group rules

2019-04-04 Thread Jeremy Stanley
In that case, as we expect stable/ocata is unaffected, the affects line should be revised as follows: Affects: >=11.0.0 <11.0.7, >=12.0.0 <12.0.6, >=13.0.0 <13.0.3 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1813007] Re: [SRU] Unable to install new flows on compute nodes when having broken security group rules

2019-04-04 Thread Jeremy Stanley
Thanks Gage, your proposed impact description in comment #43 looks great (modulo decisions on any stable/ocata backport altering the "affects" line). ** Changed in: ossa Status: Incomplete => Confirmed ** Changed in: ossa Assignee: (unassigned) => Gage Hugo (gagehugo) ** Changed in:

[Bug 1813007] Re: [SRU] Unable to install new flows on compute nodes when having broken security group rules

2019-04-03 Thread Jeremy Stanley
I see backports to pike, queens, rocky and the stein release candidate branches have been proposed according to https://review.openstack.org/#/q/I17ab643abbd2ec21eda4ae1dfb9abf2d4b0657f2 and have been positively scored by some stable branch reviewers, so I'm going to take that as a sign the

[Bug 1813007] Re: [SRU] Unable to install new flows on compute nodes when having broken security group rules

2019-04-03 Thread Jeremy Stanley
Thanks for the heads up, Joshua! The OpenStack VMT is, in turn, waiting for the reporter, Neutron reviewers or, well, anybody really to clarify the impact of this bug and indicate whether a fix will be implemented in stable branches (per my comment #35). -- You received this bug notification

[Bug 1813007] Re: [SRU] Unable to install new flows on compute nodes when having broken security group rules

2019-03-29 Thread Jeremy Stanley
Is there a chance anyone's working on backporting I17ab643abbd2ec21eda4ae1dfb9abf2d4b0657f2 upstream to stable/pike through stable/rocky? Is the impact roughly similar in nature to https://security.openstack.org/ossa/OSSA-2019-001.html or can someone make an attempt at describing a viable exploit

[Bug 1818239] Re: scheduler: build failure high negative weighting

2019-03-06 Thread Jeremy Stanley
Chris: I don't doubt that this could be a crippling incident, but you say you took down your own cloud and did so accidentally... can you provide a similar scenario where a non-admin user is able to intentionally bring about the same result? That's mostly what I'm looking for to be able to

[Bug 1818239] Re: scheduler: build failure high negative weighting

2019-03-05 Thread Jeremy Stanley
Thanks! I'm mostly looking for an exploit scenario whereby a malicious actor can intentionally cause harm/deny access to the operating environment for other users. Absent this, we'd probably not bother to issue a security advisory about it. -- You received this bug notification because you are a

[Bug 1818239] Re: scheduler: build failure high negative weighting

2019-03-05 Thread Jeremy Stanley
Is the denial of service concern that an authenticated user could engineer a build failure (perhaps by attempting to boot an intentionally corrupt image they uploaded) and perform that action repeatedly to cause the environment to no longer to be able to schedule instances to any of the hypervisor

[Bug 1811098] Re: [SRU] ceilometer writing snmp credentials to log file

2019-02-06 Thread Jeremy Stanley
A CVE can be requested by anyone for any defect. The OpenStack VMT doesn't generally request CVEs for projects it doesn't oversee, but we have a brief overview of what we'd generally recommend putting in MITRE's CVE Request form documented at https://security.openstack.org

[Bug 1746992] Re: gnocchi-api in Bionic uses python3, and libapache2-mod-wsgi-py3 conflicts with the python 2 version

2018-06-05 Thread Jeremy Stanley
https://packages.ubuntu.com/bionic/gnocchi-api seems to indicate it's coming straight through an import from Debian, where the current OpenStack ecosystem is packaged to use only Python 3.x. This probably makes it incompatible with the official Ubuntu OpenStack packaging which still relies on

[Bug 1664931] Re: [OSSA-2017-005] nova rebuild ignores all image properties and scheduler filters (CVE-2017-16239)

2017-11-15 Thread Jeremy Stanley
** Changed in: ossa Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1664931 Title: [OSSA-2017-005] nova rebuild ignores all image properties and

[Bug 1663462] Re: weather-util needs updated due to NWS changes

2017-05-27 Thread Jeremy Stanley
This is fixed by the weather-util 2.3-2 source package in Artful, if someone wants to attempt an SRU of that to Trusty and/or Xenial. ** Changed in: weather-util (Ubuntu) Status: New => Fix Released ** Changed in: weather-util (Ubuntu) Assignee: (unassigned) => Jeremy Stanley

[Bug 1663462] Re: weather-util needs updated due to NWS changes

2017-03-29 Thread Jeremy Stanley
This is fixed by the weather-util-data 2.3-1 package in Zesty, but that version of weather-util contains a nasty Py3k incompatibility which is fixed in the 2.3-2 package which just migrated to Debian testing today and so should probably get auto-imported to Zesty soon (after which we can think

[Bug 1621179] Re: weather can not get data ( http://weather.noaa.gov has been discontinued)

2017-01-29 Thread Jeremy Stanley
This was fixed in the 2.3-1 upload to Debian/sid, subsequently imported to Ubuntu/zesty. ** Changed in: weather-util (Ubuntu) Assignee: (unassigned) => Jeremy Stanley (fungi) ** Changed in: weather-util (Ubuntu) Status: Triaged => Fix Released -- You received this bug notifi

[Bug 1449062] Re: [OSSA 2016-012] qemu-img calls need to be restricted by ulimit (CVE-2015-5162)

2016-10-06 Thread Jeremy Stanley
** Summary changed: - qemu-img calls need to be restricted by ulimit (CVE-2015-5162) + [OSSA 2016-012] qemu-img calls need to be restricted by ulimit (CVE-2015-5162) ** Changed in: ossa Status: In Progress => Fix Released -- You received this bug notification because you are a member of

[Bug 1449062] Re: qemu-img calls need to be restricted by ulimit (CVE-2015-5162)

2016-10-05 Thread Jeremy Stanley
Status update: it looks like all Glance and Nova fixes have merged; so too have the master and stable/newton changes for Cinder. At this point we're waiting for https://review.openstack.org/375625 (Cinder's stable/mitaka fix) to merge, and we don't seem to have a stable/liberty backport for

[Bug 1449062] Re: qemu-img calls need to be restricted by ulimit (CVE-2015-5162)

2016-09-27 Thread Jeremy Stanley
Tristan: I'm still a little confused on the oslo.concurrency recommendation. Are you saying that we should suggest stable/liberty and stable/mitaka deployments to also use oslo.concurrency>=3.8.0? At the moment the tips of stable/liberty and stable/mitaka branches for oslo.concurrency are tagged

[Bug 1449062] Re: qemu-img calls need to be restricted by ulimit (CVE-2015-5162)

2016-09-26 Thread Jeremy Stanley
Hemanth, Daniel: So that means the current patches to Nova are insufficient because they missed `qemu-image convert` invocations? For example at http://git.openstack.org/cgit/openstack/nova/tree/nova/virt/xenapi/vm_utils.py#n1128 Tristan: Thanks, it looked like oslo.concurrency got backports to

[Bug 1449062] Re: qemu-img calls need to be restricted by ulimit (CVE-2015-5162)

2016-09-22 Thread Jeremy Stanley
Following discussion with Sean and Hemanth, it looks like we ought to get fixes for this into supported branches of Cinder and Glance after all. Hopefully getting them merged goes quickly now that Nova has already trodden this ground and the fixes are basically identical between them. Assuming

[Bug 1449062] Re: qemu-img calls need to be restricted by ulimit (CVE-2015-5162)

2016-09-22 Thread Jeremy Stanley
I'm resurrecting Grant's proposed impact description from comment #28 and updating for the year of time which has passed since. I've also edited it to remove references to Cinder and Glance... are those effectively still impacted in any supported branches? I see that the tasks API in Glance

[Bug 1449062] Re: qemu-img calls need to be restricted by ulimit (CVE-2015-5162)

2016-09-22 Thread Jeremy Stanley
** Changed in: ossa Status: Incomplete => In Progress ** Changed in: ossa Assignee: (unassigned) => Jeremy Stanley (fungi) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1449062

[Bug 1449062] Re: qemu-img calls need to be restricted by ulimit (CVE-2015-5162)

2016-09-20 Thread Jeremy Stanley
Based on the thread at http://lists.openstack.org/pipermail/openstack- dev/2016-September/104091.html we may need to figure out how to adjust the messaging to indicate that it was a severe enough bug to fix in stable/mitaka but that stable/liberty will be left unfixed. ** Changed in: ossa

[Bug 1376316] Re: nova absolute-limits floating ip count is incorrect in a neutron based deployment

2016-04-20 Thread Jeremy Stanley
** Information type changed from Public Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1376316 Title: nova absolute-limits floating ip count is incorrect in a neutron based

[Bug 1422046] Re: cinder backup-list is always listing all tenants's bug for admin

2015-11-10 Thread Jeremy Stanley
Correct, we consider that latter case a "security hardening opportunity" and I'm triaging this report as one now (class D in our taxonomy https://security.openstack.org/vmt-process.html#incident-report-taxonomy ). Depending on severity and available time from editors in the Security Team, these

[Bug 1422046] Re: cinder backup-list is always listing all tenants's bug for admin

2015-11-10 Thread Jeremy Stanley
Correct, we consider that latter case a "security hardening opportunity" and I'm triaging this report as one now (class D in our taxonomy https://security.openstack.org/vmt-process.html#incident-report-taxonomy ). Depending on severity and available time from editors in the Security Team, these

[Bug 1422046] Re: cinder backup-list is always listing all tenants's bug for admin

2015-11-09 Thread Jeremy Stanley
It looks like bug 1514396 has been opened for the same issue in the V1 API. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to python-cinderclient in Ubuntu. https://bugs.launchpad.net/bugs/1422046 Title: cinder backup-list is always

[Bug 1422046] Re: cinder backup-list is always listing all tenants's bug for admin

2015-11-09 Thread Jeremy Stanley
It looks like bug 1514396 has been opened for the same issue in the V1 API. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1422046 Title: cinder backup-list is always listing all tenants's bug for

[Bug 1422046] Re: cinder backup-list is always listing all tenants's bug for admin

2015-11-09 Thread Jeremy Stanley
While I agree there is a non-negligible risk presented by this behavior, I don't see how a malicious actor could use this flaw to their advantage. As such, it doesn't seem like something for which the OpenStack Vulnerability Management Team would issue an official security advisory. -- You

[Bug 1422046] Re: cinder backup-list is always listing all tenants's bug for admin

2015-11-09 Thread Jeremy Stanley
Sounds like we're agreed that this report concerns a serious bug with security implications (insofar as any means of accidentally destroying your environment is), but is not an exploitable vulnerability, does not need a CVE assignment requested by the VMT and won't lead to any official security

[Bug 1422046] Re: cinder backup-list is always listing all tenants's bug for admin

2015-11-09 Thread Jeremy Stanley
While I agree there is a non-negligible risk presented by this behavior, I don't see how a malicious actor could use this flaw to their advantage. As such, it doesn't seem like something for which the OpenStack Vulnerability Management Team would issue an official security advisory. -- You

[Bug 1422046] Re: cinder backup-list is always listing all tenants's bug for admin

2015-11-09 Thread Jeremy Stanley
Sounds like we're agreed that this report concerns a serious bug with security implications (insofar as any means of accidentally destroying your environment is), but is not an exploitable vulnerability, does not need a CVE assignment requested by the VMT and won't lead to any official security

[Bug 1422046] Re: cinder backup-list is always listing all tenants's bug for admin

2015-10-27 Thread Jeremy Stanley
Since this report concerns a possible security risk, an incomplete security advisory task has been added while the core security reviewers for the affected project or projects confirm the bug and discuss the scope of any vulnerability along with potential solutions. ** Also affects: ossa

[Bug 1422046] Re: cinder backup-list is always listing all tenants's bug for admin

2015-10-27 Thread Jeremy Stanley
Since this report concerns a possible security risk, an incomplete security advisory task has been added while the core security reviewers for the affected project or projects confirm the bug and discuss the scope of any vulnerability along with potential solutions. ** Also affects: ossa

[Bug 1348954] Re: update Python3 for trusty

2015-04-12 Thread Jeremy Stanley
Brian, was comment #5 a mis-update? This bug is about getting newer Python 3.4 into Trusty, not a newer python-urllib3 module. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1348954 Title: update

[Bug 1382607] Re: [SRU] Backport python3.4 logging module backward incompatibility fix.

2015-01-27 Thread Jeremy Stanley
Based on E-mail discussion with Barry and Matthias, it sounds like the plan now is to SRU MRE Python 3.4.3 into Trusty once it's available (due out February 22, 2015 according to the official release schedule). -- You received this bug notification because you are a member of Ubuntu Bugs, which

[Bug 1348954] Re: update Python3 for trusty

2015-01-27 Thread Jeremy Stanley
Based on E-mail discussion with Barry and Matthias, it sounds like the plan now is to SRU MRE Python 3.4.3 into Trusty once it's available (due out February 22, 2015 according to the official release schedule). -- You received this bug notification because you are a member of Ubuntu Bugs, which

[Bug 1367907] Re: Segfault in gc with cyclic trash

2015-01-27 Thread Jeremy Stanley
Based on E-mail discussion with Barry and Matthias, it sounds like the plan now is to SRU MRE Python 3.4.3 into Trusty once it's available (due out February 22, 2015 according to the official release schedule). -- You received this bug notification because you are a member of Ubuntu Bugs, which

[Bug 832507] Re: console.log grows indefinitely

2015-01-14 Thread Jeremy Stanley
It's now (UTC) Thursday. ** Changed in: ossa Status: Incomplete = Won't Fix ** Tags added: security ** Information type changed from Public Security to Public -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu.

[Bug 832507] Re: console.log grows indefinitely

2015-01-14 Thread Jeremy Stanley
It's now (UTC) Thursday. ** Changed in: ossa Status: Incomplete = Won't Fix ** Tags added: security ** Information type changed from Public Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 832507] Re: console.log grows indefinitely

2015-01-12 Thread Jeremy Stanley
Agreed, this is class C2 (a vulnerability in some dependency, not in OpenStack code, and so nothing we're going to fix with a patch to OpenStack security supported projects nor anything for which we should issue a security advisory). If there are no disagreements, I'll switch this to a regular

[Bug 832507] Re: console.log grows indefinitely

2015-01-12 Thread Jeremy Stanley
Agreed, this is class C2 (a vulnerability in some dependency, not in OpenStack code, and so nothing we're going to fix with a patch to OpenStack security supported projects nor anything for which we should issue a security advisory). If there are no disagreements, I'll switch this to a regular

[Bug 832507] Re: console.log grows indefinitely

2014-12-06 Thread Jeremy Stanley
** Changed in: ossa Assignee: hzxiongwenwu (xwwzzy) = (unassigned) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/832507 Title: console.log grows indefinitely To manage

[Bug 832507] Re: console.log grows indefinitely

2014-12-06 Thread Jeremy Stanley
** Changed in: ossa Assignee: hzxiongwenwu (xwwzzy) = (unassigned) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/832507 Title: console.log grows indefinitely To manage notifications about

[Bug 1367907] Re: Segfault in gc with cyclic trash

2014-11-25 Thread Jeremy Stanley
Is the plan to solve this in Trusty via bug 1348954 or to separately SRU the upstream patch? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1367907 Title: Segfault in gc with cyclic trash To manage

[Bug 1348954] Re: update Python3 for trusty

2014-11-25 Thread Jeremy Stanley
Is there any chance we could get latest upstream 3.4 SRU'd soon? We're tracking a couple of relatively serious regressions issues fixed upstream but still present in Trusty. See bug 1367907 and bug 1382607 for details. -- You received this bug notification because you are a member of Ubuntu

[Bug 1382607] Re: [SRU] Backport python3.4 logging module backward incompatibility fix.

2014-11-25 Thread Jeremy Stanley
Is the plan to solve this in Trusty via bug 1348954 or to separately SRU the upstream patch? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1382607 Title: [SRU] Backport python3.4 logging module

[Bug 1367907] Re: Segfault in gc with cyclic trash

2014-10-14 Thread Jeremy Stanley
I've confirmed that upgrading a Trusty/amd64 VM to the python3.4 packages in that PPA fixes the issue we observed running unit tests for OpenStack's oslo.messaging project under that interpreter. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed

[Bug 1379201] Re: openvswitch-datapath-dkms 1.4.6-0ubuntu1.12.04.3: openvswitch kernel module failed to build

2014-10-09 Thread Jeremy Stanley
** Also affects: neutron Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openvswitch in Ubuntu. https://bugs.launchpad.net/bugs/1379201 Title: openvswitch-datapath-dkms

[Bug 1379201] Re: openvswitch-datapath-dkms 1.4.6-0ubuntu1.12.04.3: openvswitch kernel module failed to build

2014-10-09 Thread Jeremy Stanley
** Also affects: neutron Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1379201 Title: openvswitch-datapath-dkms 1.4.6-0ubuntu1.12.04.3: openvswitch

[Bug 1368418] [NEW] Fatal RPython error: KeyError/Crash in JIT!

2014-09-11 Thread Jeremy Stanley
Public bug reported: Trusty's pypy 2.2.1+dfsg-1 package seems to be affected by PyPy bugs https://bitbucket.org/pypy/pypy/issue/1669 and https://bitbucket.org/pypy/pypy/issue/1694/ (which are probably duplicates manifesting in a couple ways). This bug is fixed in

[Bug 1294874] Re: Sub-process /usr/bin/dpkg returned an error code

2014-07-08 Thread Jeremy Stanley
** Tags added: gate-failure ** Changed in: openstack-ci Status: New = Triaged ** Changed in: openstack-ci Importance: Undecided = Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1308050] Re: git-review crashes when using it with Python 2 (not with Python 3)

2014-07-03 Thread Jeremy Stanley
** Changed in: git-review Importance: Undecided = High ** Changed in: git-review Assignee: (unassigned) = Matthieu Baerts (matttbe) ** Changed in: git-review Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which

[Bug 1284718] Re: interface-attach to external network a) works and b) results in undeletable instances

2014-04-03 Thread Jeremy Stanley
Seems there's consensus that this is not an exploitable vulnerability. Also, the bug was originally, even if only very briefly, public when it was first opened (thus broader exposure has already compromised any effective embargo). ** Changed in: ossa Status: Incomplete = Invalid **

[Bug 1284718] Re: interface-attach to external network a) works and b) results in undeletable instances

2014-04-03 Thread Jeremy Stanley
Seems there's consensus that this is not an exploitable vulnerability. Also, the bug was originally, even if only very briefly, public when it was first opened (thus broader exposure has already compromised any effective embargo). ** Changed in: ossa Status: Incomplete = Invalid **

[Bug 1228977] Re: n-cpu seems to crash when running with libvirt 1.0.6 from ubuntu cloud archive

2014-01-07 Thread Jeremy Stanley
Note that we inadvertently tested libvirt from UCA on all our CI infrastructure today and ran into bug 1266711 (probably related). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1228977 Title: n-cpu

[Bug 1228977] Re: n-cpu seems to crash when running with libvirt 1.0.6 from ubuntu cloud archive

2013-11-28 Thread Jeremy Stanley
I got a few minutes to recreate the failing test run and tarred up the screen-n-*.log files (attached) once it finished. ** Attachment added: Nova screen logs from failing tempest run https://bugs.launchpad.net/nova/+bug/1228977/+attachment/3919446/+files/screen-n-logs.tar.xz -- You

[Bug 1228977] Re: n-cpu seems to crash when running with libvirt 1.0.6 from ubuntu cloud archive

2013-11-28 Thread Jeremy Stanley
Adding the libvirt log as Chuck requested in IRC just now. ** Attachment added: libvirtd.log https://bugs.launchpad.net/nova/+bug/1228977/+attachment/3919471/+files/libvirtd.log -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1228977] Re: n-cpu seems to crash when running with libvirt 1.0.6 from ubuntu cloud archive

2013-11-25 Thread Jeremy Stanley
Worth noting, when running full tempest on an 8GB DevStack VM in both Rackspace and HPCloud with Ubuntu Cloud Archive added to the sources list, I get numerous job failures with corresponding repetitions of this in the console: Traceback (most recent call last): File

[Bug 1228977] Re: n-cpu seems to crash when running with libvirt 1.0.6 from ubuntu cloud archive

2013-11-25 Thread Jeremy Stanley
Probably--I wasn't collecting logs, just confirming whether or not gating is going to break if we reenable UCA. If nobody with nova debugging experience or interest in using UCA/newer libvirt has time to repeat that experiment, I can recreate it and find/attach the service logs some time in the

[Bug 1245676] Re: pip install pbr==0.5.22 fails unless run twice on ubuntu 12.04

2013-10-28 Thread Jeremy Stanley
** Also affects: pbr Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1245676 Title: pip install pbr==0.5.22 fails unless run twice on ubuntu 12.04 To

[Bug 1210822] Re: Please import 0.8.8b+dfsg-2 from Debian and backport security fixes to 12.04 LTS

2013-08-14 Thread Jeremy Stanley
I get a clean cacti_0.8.7i-2ubuntu1.1_all.deb via 'debuild -b -uc -us' on an up to date precise VM with this debdiff applied, though lintian is mildly displeased with your changelog.Debian addition... Now running lintian... W: cacti: debian-changelog-line-too-long line 4 W: cacti:

[Bug 1210822] [NEW] Please import 0.8.8b+dfsg-2 from Debian and backport security fixes to 12.04 LTS

2013-08-10 Thread Jeremy Stanley
*** This bug is a security vulnerability *** Public security bug reported: The cacti source in Debian/sid as of today now addresses CVE-2013-1434 and CVE-2013-1435. ** Affects: cacti (Ubuntu) Importance: Undecided Status: New ** Information type changed from Private Security to

[Bug 1193172] Re: Populating Hyper-V MSR for Ubuntu 13.10

2013-06-21 Thread Jeremy Stanley
** No longer affects: git-review -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1193172 Title: Populating Hyper-V MSR for Ubuntu 13.10 To manage notifications about this bug go to:

[Bug 1069894] Re: Sphinx fails to build on raring

2012-12-16 Thread Jeremy Stanley
Upstream Sphinx issue report is at: https://bitbucket.org/birkenfeld/sphinx/issue/998/docutils-010-will- break-sphinx-manpage -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1069894 Title: Sphinx