This bug was fixed in the package libguestfs - 1:1.22.4-1ubuntu1
---
libguestfs (1:1.22.4-1ubuntu1) saucy-proposed; urgency=low
* Add debian/patches/-Fix-udev-startup.patch: Fix udevd startup in
appliances. Patch backported from upstream git. (LP: #1243190)
-- Martin Pitt
** Attachment added: libguestfs-test-tool-output.txt
https://bugs.launchpad.net/ubuntu/+source/libguestfs/+bug/1243190/+attachment/3925383/+files/libguestfs-test-tool-output.txt
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification
Hello Brian,
I've installed the fix available from saucy-proposed repository on my
up-to-date saucy system and I can confirm that it fixes this bug.
Here are the details of steps I performed to verify the fix:
1. Install updates for guestfish and libguestfs-tools packages from
saucy-proposed
The libguestfs-test-tool output (comment 25) looks fine to me.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1243190
Title:
Failed to connect to virtio-serial channel
To manage notifications about
Hello Nikos, or anyone else affected,
Accepted libguestfs into saucy-proposed. The package will build now and
be available at
http://launchpad.net/ubuntu/+source/libguestfs/1:1.22.4-1ubuntu1 in a
few hours, and then in the -proposed repository.
Please help us by testing this new package. See
Great, happy to test again if you need it.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1243190
Title:
Failed to connect to virtio-serial channel
To manage notifications about this bug go to:
Hi, I dunno how SRU works, I've tested the SRU code (untared tarball,
then compiled and launched tests) on a recent saucy installation (on top
of a raring install and had many tests failing 'cos of tests not being
executable. I am not sureif that's because permissions should be set by
the .deb.
This doesn't look happy. If configure and/or autogen.sh are not
executable, it seems to indicate that permissions got badly screwed up
somewhere along the way :-( Also the *.sh scripts mentioned in comment
18 ought to be executable. If they're not, it would explain why the
tests completely fail
Martin - thanks!
I had the udev package held to 175-0ubuntu29 and allowed it to update to
the released 204-0ubuntu19 version. I then built the 1.22.4-1ubuntu1
package locally using pbuilder and it works great. Both libguestfs-test-
tool and my application using libguestfs work properly.
--
You
Hello Matt,
Matt Whiteley [2013-11-19 19:38 -]:
I had the udev package held to 175-0ubuntu29 and allowed it to update to
the released 204-0ubuntu19 version. I then built the 1.22.4-1ubuntu1
package locally using pbuilder and it works great. Both libguestfs-test-
tool and my application
Could we please get a decision on if this will be updated in Saucy or if
I should file a backports request for it?
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1243190
Title:
Failed to
I'll prepare an SRU, if you can test it.
** Also affects: libguestfs (Ubuntu Saucy)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1243190
Title:
Failed
** Changed in: libguestfs (Ubuntu Saucy)
Status: New = In Progress
** Description changed:
Description:Ubuntu 13.10
Release:13.10
In a clean system if I do:
sudo apt-get install libguestfs-tools
a guestfs appliance is created in the post-install script that
SRU uploaded, waiting in the SRU review queue now
(https://launchpad.net/ubuntu/saucy/+queue?queue_state=1).
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1243190
Title:
Failed to connect to
Are you planning to release an update for saucy or will the release stay
with an unusable package?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1243190
Title:
Failed to connect to virtio-serial
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-4419
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1243190
Title:
Failed to connect to virtio-serial channel
To manage
Is this something that will be published to saucy-updates or saucy-
backports?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1243190
Title:
Failed to connect to virtio-serial channel
To manage
This is fixed in the latest upstream release, syncing from Debian.
** Changed in: libguestfs (Ubuntu)
Status: Triaged = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1243190
This bug was fixed in the package libguestfs - 1:1.23.33-1
---
libguestfs (1:1.23.33-1) experimental; urgency=low
* New upstream development version
* Added patch to fix out-of-tree build
* Updated (build-)dependencies
* Integrated guestfish into libguestfs-tools package
* Martin Pitt:
This is fixed in the latest upstream release, syncing from Debian.
libguestfs 1:1.23.33-1 is
- marked as a development version by upstream.
- placed in Debian's experimental repository.
The latest release in Debian/unstable is 1:1.22.7-1. If you have any
expectations wrt the
BTW 1.22.7 upstream doesn't contain commit
ec6f9ee542e0e9ad0109a7522e83ea07b2f8a002
which is the fix for this bug, unless it has been added separately in
the Debian package.
I'd prefer everyone switched to 1.24 :-)
I'm also worried that 1.23.33 may not contain a fix for CVE-2013-4419
Indeed, let's move to 1.24.0, that's a stable release again with the
security fix.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1243190
Title:
Failed to connect to virtio-serial channel
To manage
* Martin Pitt:
Indeed, let's move to 1.24.0, that's a stable release again with the
security fix.
If you can wait a few days, that's what I'm going to do for
Debian/unstable anyhow.
-Hilko
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
Ah, sorry Hilko, already uploaded:
https://launchpad.net/ubuntu/+source/libguestfs/1:1.24.0-0ubuntu1 (I
felt guilty of introducing a CVE). But I'll sync the Debian unstable
version once it lands, thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
24 matches
Mail list logo