I confirmed the package from Nigel's PPA works well and fixed the issue.
I'd still really appreaciate if the package could re-enter -proposed and
later -updates. Thanks
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu-kvm in
@Serge, any chance in finding an admin to accept the upload to
-proposed? Thanks
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/589063
Title:
Windows Server 2008 won't boot with
Many thanks Serge and Adam, the package in -proposed works perfectly.
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu-kvm in Ubuntu.
Public bug reported:
I hooked my new CyberPower UPS: CP685AVR-G on my Lucid server and got
this error:
Jan 15 12:06:33 xeon upsd[5441]: Can't connect to UPS [cyberpower]
(usbhid-ups-cyberpower): No such file or directory
Jan 15 12:06:38 xeon upsmon[5445]: Poll UPS [cyberpower@127.0.0.1]
** Bug watch added: Red Hat Bugzilla #488368
https://bugzilla.redhat.com/show_bug.cgi?id=488368
** Also affects: nut (Fedora) via
https://bugzilla.redhat.com/show_bug.cgi?id=488368
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member
Is there any chance to SRU nut-2.6.3-2 to Precise?
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nut in Ubuntu.
https://bugs.launchpad.net/bugs/920844
Title:
nut-client is missing /etc/init.d/ups-monitor for MODE=netclient (is
Public bug reported:
According to https://lists.ubuntu.com/archives/ubuntu-devel-
announce/2013-January/001003.html, Precise 12.04.2 will ship with kernel
3.5.0. This new kernel comes with DRBD 8.3.13 but the drbd8-utils
package in Precise are still is at version 8.3.11.
Running a different
Jacob, that is also my understanding, the userspace utility version must
always match the DRBD module version.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to drbd8 in Ubuntu.
https://bugs.launchpad.net/bugs/1103656
Title:
Update
** Patch added: Lib.pm.patch
https://bugs.launchpad.net/debian/+source/backuppc/+bug/1119628/+attachment/3521079/+files/Lib.pm.patch
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to backuppc in Ubuntu.
Public bug reported:
Interacting starting BackupPC using the init script result in the
following warnings to be emitted:
* Starting backuppc...
Use of qw(...) as parentheses is deprecated at
/usr/share/backuppc/lib/BackupPC/Storage/Text.pm line 302.
Use of qw(...) as parentheses is
** Patch added: Text.pm.patch
https://bugs.launchpad.net/debian/+source/backuppc/+bug/1119628/+attachment/3521080/+files/Text.pm.patch
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to backuppc in Ubuntu.
If anyone is too lazy to apply those 2 patches, an easy way to correct
it is with sed:
sed -i 's/\(^[[:space:]]\+foreach my \$param\) \(qw(BackupFilesOnly
BackupFilesExclude)\) {$/\1 (\2) {/'
/usr/share/backuppc/lib/BackupPC/Lib.pm
/usr/share/backuppc/lib/BackupPC/Storage/Text.pm
--
You
** Changed in: backuppc (Ubuntu)
Status: New = Confirmed
** Changed in: backuppc (Ubuntu)
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to backuppc in Ubuntu.
Thanks for looking that up Lionel.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to drbd8 in Ubuntu.
https://bugs.launchpad.net/bugs/1103656
Title:
Update Precise drbd8-utils to 8.3.13 for the 12.04.2 release
To manage notifications
Assuming /etc/default/lxc is sourced, how about integrating this
directly in it:
# Is there a local apt-proxy/cacher available ?
eval $(apt-config shell MIRROR Acquire::http::Proxy)
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to
It seems there is a typo in your fr_CA.UTF8 locale. Maybe try with
fr_CA.UTF-8 ?
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1166841
Title:
lxc-create fails if LANG != en_GB.UTF-8
another typo local-gen != locale-gen :)
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1166841
Title:
lxc-create fails if LANG != en_GB.UTF-8
To manage notifications about this bug go
*** This bug is a security vulnerability ***
Public security bug reported:
OpenVPN 2.3.0 and earlier are affected by CVE-2013-2061 in some
configuration. The security impact is fairly low but still worth fixing
IMHO.
Upstream fix announcement:
** Branch linked: lp:~sdeziel/ubuntu/raring/openvpn/fix-for-lp1184223
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openvpn in Ubuntu.
https://bugs.launchpad.net/bugs/1184223
Title:
CVE-2013-2061: use of non-constant-time memcmp
The quantal-proposed package works fine, thanks.
** Tags removed: verification-needed
** Tags added: verification-done verification-done-quantal
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openvpn in Ubuntu.
Precise now ships MySQL 5.5.31
** Changed in: mysql-5.5 (Ubuntu)
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to mysql-5.5 in Ubuntu.
https://bugs.launchpad.net/bugs/1150431
Title:
Mysql
*** This bug is a duplicate of bug 1124398 ***
https://bugs.launchpad.net/bugs/1124398
** This bug has been marked a duplicate of bug 1124398
openvpn --script-security is not working
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed
** Changed in: openvpn (Ubuntu)
Status: Confirmed = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openvpn in Ubuntu.
https://bugs.launchpad.net/bugs/1016744
Title:
OpenVPN example easy-rsa 2.0 issues
To
*** This bug is a duplicate of bug 992012 ***
https://bugs.launchpad.net/bugs/992012
** This bug has been marked a duplicate of bug 992012
No /openssl.cnf file could be found because of a wrong regex in
whichopensslcnf
--
You received this bug notification because you are a member of
2.3.1 is currently in Saucy
** Changed in: openvpn (Ubuntu)
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openvpn in Ubuntu.
https://bugs.launchpad.net/bugs/1180285
Title:
Update to 2.3
To
Brandon, you could probably workaround that limitation in 2 different
ways. First would be to install the network-manager-openvpn package if
not already done and use it to import and connect to your VPN. Second
would be to make sure the VPN is marked for autostart in
/etc/default/openvpn.
Marking
Marking as Fix released based on Peter's comment (#11). Thanks
** Changed in: openvpn (Ubuntu)
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openvpn in Ubuntu.
** Bug watch added: Debian Bug tracker #693070
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=693070
** Also affects: easy-rsa (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=693070
Importance: Unknown
Status: Unknown
--
You received this bug notification because
The OpenVPN Debian maintainer (Alberto Gonzalez Iniesta) already took
care of the split in Debian and this percolated to Ubuntu. The easy-
rsa package is installable starting with Raring even if the old easy-
rsa scripts are still bundled with OpenVPN. Starting with OpenVPN
2.3.1, the old
I too needed to know when security packages were available so I cooked
my own (*) wrapper around /usr/lib/update-notifier/apt-check. It works
well and also provides perf_data for those who'd like to visualize the
package availability.
*: https://github.com/simondeziel/custom-nagios-
Avery, in comment #2 you mentioned it started with 2.3.2-4ubuntu1 but I
noticed this problematic behavior since at least the version shipped in
Precise: 2.2.1-8ubuntu1.1.
The init script sleeps for 1 second between stop and start when asked to
restart. As a temporary workaround, sleeping for 3
@Avery, I've put up a little patch for the initscript that removes all
sleeps and wait for the PID file to vanish before considering the stop
action completed. Since it now uses start-stop-daemon it should be a
little bit clever.
It works well with my 4 VPNs here but would appreciate if you could
Thanks for testing Avery. I'll try to open a bug in Debian to hopefully
have this fixed at the source. If that goes well, Ubuntu will be next.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openvpn in Ubuntu.
** Bug watch added: Debian Bug tracker #716794
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=716794
** Also affects: openvpn (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=716794
Importance: Unknown
Status: Unknown
--
You received this bug notification because
The Debian maintainer fixed this behavior in 2.3.2-4 and this version
recently made it into Ubuntu Saucy.
** Changed in: openvpn (Ubuntu)
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openvpn
Public bug reported:
The logcheck ignore and violation rules works well when using only the
default policy bank but they fail to match alternate policy banks log
messages. Here is an example of one log that should have match (but
didn't) :
Sep 29 00:02:10 www amavis[25415]: (25415-05) Passed
What I would suggest is to replace this ignore rules (and all other
similar) :
^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+ amavis\[[[:digit:]]+\]:
\([-[:digit:]]+\) Passed CLEAN,( \[[.:[:xdigit:]]+\]){0,2} [^]* -
[^]*(,[^]*)*, Message-ID: [^]+( \((added
by[^)]+|sfid-[_[:xdigit:]]+)\))?,(
@Dave
I just noticed that my diff in comment #1 does not match all cases as it
does not catch IPv6 addresses.
There are more problems than simply the policy bank name appearing in
the logs. Here are all the cases that make logcheck report noise (fail
to silence the log messages as they no longer
** Patch added: logcheck violations.ignore.d diff
https://bugs.launchpad.net/ubuntu/+source/amavisd-new/+bug/862416/+attachment/2487919/+files/logcheck.violation.diff
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to amavisd-new in
I am also annoyed by that behaviour after every update of the package.
Adam's analysis in comment #7 is right and I think its suggestion should
be implemented.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to libvirt in Ubuntu.
Public bug reported:
While attempting a live migration the destination host (node1) logs this
:
Oct 5 17:13:56 node1 kernel: [ 1418.872987] type=1503
audit(1317849236.311:29): operation=mknod pid=1975 parent=1
profile=libvirt-4aa60863-6b03-2f19-897f-4de6d12c96e1 requested_mask=c::
Adding the following to /etc/apparmor.d/abstractions/libvirt-qemu :
/{,var/}run/libvirt/qemu/* rw,
After fixing the Apparmor profile, the migration still fails but not due
to Apparmor getting in the way. Instead it blocks on another bug (that
deserves a separated bug in LP) :
Oct 6 17:30:13
** Summary changed:
- KVM migration fails when tunnelled
+ Apparmor prevents KVM tunnelled migration
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to libvirt in Ubuntu.
https://bugs.launchpad.net/bugs/869553
Title:
Apparmor prevents
Public bug reported:
While attempting a live migration tunnelled like this :
virsh migrate --live --tunnelled --p2p guest1
qemu+ssh://192.168.99.3/system
the source host (node1) logs this error :
Oct 6 17:44:06 node2 libvirtd: 17:44:06.513: error :
qemuMonitorTextGetMigrationStatus:982 :
When looking at the upstream git I found that Daniel P. Berrange had
already fixed that in commit 0d3eee7fe8bcaa49. I have extract only the
portion of this commit that touches src/qemu/qemu_monitor_text.c and
created a debdiff with it.
** Patch added: Fix parsing of 'info migration' reply
This bug does not affect Maverick and higher as they are based from a
version including the upstream fix already.
I forgot to mention by here are the information of my affected system :
# lsb_release -rd
Description: Ubuntu 10.04.3 LTS
Release: 10.04
# apt-cache policy libvirt-bin
libvirt-bin:
The bug #869590
(https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/869590) was
opened for the qemuMonitrText migration parsing error.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to libvirt in Ubuntu.
Thanks Serge, I appreciate your responsiveness.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to libvirt in Ubuntu.
https://bugs.launchpad.net/bugs/869590
Title:
KVM migration fails when tunnelled due to parsing error in qemu
On the receiving host :
root@node1:~# cat /var/log/libvirt/qemu/guest1.log
LC_ALL=C PATH=/usr/local/sbin:/usr/local/bin:/usr/bin:/usr/sbin:/sbin:/bin
QEMU_AUDIO_DRV=none /usr/bin/kvm -S -M pc-0.12 -enable-kvm -m 512 -smp 1 -name
guest1 -uuid 4aa60863-6b03-2f19-897f-4de6d12c96e1 -chardev
Public bug reported:
I'm using a Natty host and an Oneiric guest (both fully up to date) to
do some KVM testing. Hot plugging a CPU like this :
virsh setvcpus oneiric --count 2 --live
generates the following messages in /var/log/libvirt/qemu/oneiric.log :
kvm:
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/878422
Title:
CPU hot plug kills the guest
To manage notifications about this bug go to:
Here is the guest definition extracted from virsh dumpxml oneiric
** Attachment added: KVM guest XML definition
https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/878422/+attachment/2561378/+files/oneiric.xml
--
You received this bug notification because you are a member of Ubuntu
@Jamie, please let me know if more information is required. I've set the
status to New again but let me know if I should have set it to
Triaged or any other status. Thank you.
** Changed in: libvirt (Ubuntu)
Status: Incomplete = New
--
You received this bug notification because you are a
@Jamie, I assumed that your advise to not modify the .files profile
directly was because this file is regenerated on the VM startup. I have
attached a patch to have virt-aa-helper add the required rule to the
/etc/apparmor.d/libvirt/libvirt-UUID.files. Let me know if that's not
the correct/best
If you were intending to do that yourself, please let me know and
sorry for stepping on your toes :)
Oh no, be my guest. Thanks a lot for taking care of this (as well as LP:
#869590).
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to
Setting back to New as I think that my comment #3 addresses the
request of Dave in comment #2.
** Changed in: amavisd-new (Ubuntu)
Status: Expired = New
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to amavisd-new in Ubuntu.
Tim, your patch in comment #1 is definitely an improvement but I think
the definition of a probable spam (SPAMMY) should be revised as that
is configurable in Amavis. Would it be possible to grep for 'Passed
SPAMMY' instead ?
Passed SPAMMY is used by Amavis for messages with hits between
)
Importance: Undecided
Assignee: Simon Déziel (sdeziel)
Status: New
** Tags: amd64 apport-bug natty
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openvpn in Ubuntu.
https://bugs.launchpad.net/bugs/907828
Title:
tun
** Changed in: openvpn (Ubuntu)
Assignee: (unassigned) = Simon Déziel (sdeziel)
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openvpn in Ubuntu.
https://bugs.launchpad.net/bugs/907828
Title:
tun-based VPNs using the subnet
I cannot reproduce this using racoon and privilege separation on
Oneiric. Here is my privsep configuration section (no chroot) :
privsep
{
user racoon;
group racoon;
}
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to ipsec-tools in
Public bug reported:
My IPsec tunnel is forming and working properly but when I flush the SPD
information manually racoon segfaults :
service racoon start
setkey -f /etc/racoon/scripts/setkey
# test tunnel: OK
# Remove SPD
cat EOF | setkey -c
flush;
spdflush;
EOF
The last command gives this
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to ipsec-tools in Ubuntu.
https://bugs.launchpad.net/bugs/913935
Title:
racoon segfaults when flusing SPD
To manage notifications about this bug go to:
Here is my racoon configuration (remote IP obfuscated) :
$ cat /etc/racoon/racoon.conf
privsep
{
user racoon;
group racoon;
}
log notify;
path certificate /etc/racoon/certs;
path script /etc/racoon/scripts;
remote 1.2.3.4 {
exchange_mode main;
nat_traversal on;
@Dave, here is the backtrace. FYI, the crash only happens in the
separated unprivileged process. The crash does not occur when running
with root.
** Attachment added: Racoon's unprivileged process backtrace
The bug was reported in Debian (http://bugs.debian.org/cgi-
bin/bugreport.cgi?bug=656241). The patch was also attached to the Debian
bug. Let me know if I need to do something else, thanks.
** Bug watch added: Debian Bug tracker #656241
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=656241
A reworked patch is now available in OpenVPN 2.2.1-5 in Debian. Is it
too late to sync/merge into Precise ?
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openvpn in Ubuntu.
https://bugs.launchpad.net/bugs/907828
Title:
tun-based
@Stéphane, your test package works well on a freshly installed Precise
VM. Thanks
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openvpn in Ubuntu.
https://bugs.launchpad.net/bugs/907828
Title:
tun-based VPNs using the subnet
@Michael, I haven't tried to reproduce your issue but maybe some of the
bridge bottleneck comes from the netfilter hooks ?
Maybe you could try setting those sysctl keys :
net.bridge.bridge-nf-call-iptables=0
net.bridge.bridge-nf-call-ip6tables=0
net.bridge.bridge-nf-call-arptables=0
That is
Please, let me know if the backtrace is not enough.
** Changed in: ipsec-tools (Ubuntu)
Status: Expired = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to ipsec-tools in Ubuntu.
https://bugs.launchpad.net/bugs/913935
Public bug reported:
When using ssh-copy-id to copy a public key to a SELinux enabled
destination host (like a CentOS 6 default install) the resulting
~/.ssh/authorized_keys file on the SELinux box does not have the right
labelling :
# ll -Z .ssh/authorized_keys
-rw---. root root
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/965663
Title:
ssh-copy-id doesn't call restorecon on SELinux enabled destination
hosts
To manage notifications about this bug go
** Changed in: openvpn (Ubuntu)
Status: New = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openvpn in Ubuntu.
https://bugs.launchpad.net/bugs/992012
Title:
No /openssl.cnf file could be found because of a wrong
@Munzir, your patch is in the wrong order. Here is a minimal patch
hoping this could be SRUed.
** Patch added: Make the trailing alpha numeric character of the version
string optional
Here is my own profile that works with Squid3 (squid2 is no longer in
Precise). I run it in production but I do not use any external auth. A
quick comparison with PatRiehecky's profile showed the my profile does
not have abstractions/consoles and that might or might not be required
by some
Sent in https://lists.ubuntu.com/archives/apparmor/2012-May/002696.html.
Thanks Jamie.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to squid in Ubuntu.
https://bugs.launchpad.net/bugs/497790
Title:
squid should provide an apparmor
The patch was accepted upstream: https://github.com/OpenVPN/easy-
rsa/commit/a812fed7fbc39d4936c348d4a1a9c0e07e6d65f6
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openvpn in Ubuntu.
https://bugs.launchpad.net/bugs/992012
Title:
This should now be simpler to achieve since upstream now makes easy-rsa
available in a separated git repo : https://github.com/OpenVPN/easy-rsa/
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openvpn in Ubuntu.
*** This bug is a duplicate of bug 794916 ***
https://bugs.launchpad.net/bugs/794916
** This bug has been marked a duplicate of bug 794916
initscript wrongly sets --script-security
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed
Another workaround is to reorder sources.list to have -security before
-updates like this:
$ cat /etc/apt/sources.list
deb http://archive.ubuntu.com/ubuntu/ precise main universe
deb http://archive.ubuntu.com/ubuntu/ precise-security main universe
deb http://archive.ubuntu.com/ubuntu/
Public bug reported:
rfc-ignorant.org will stop working soon (October 30th 2012) and should
be removed from Spamassassin DNSBL lookups. More details on http://rfc-
ignorant.org/endofanera.php
** Affects: spamassassin
Importance: Unknown
Status: Unknown
** Affects: spamassassin
Those running the sa-update daily cron job are not affected by this as
the RFC-ignorant rules were removed upstream already. The base package
would still require to be updated for installations not using the sa-
update facility.
--
You received this bug notification because you are a member of
Public bug reported:
Collecting and plotting the uptime seems pointless as this gives no
valuable information. Enabling this plugin by default when installing
munin-node will waste resources when polling all nodes and also when
generating graphs. I think the default setup should not enable this
On 12-10-19 01:07 AM, Kenyon Ralph wrote:
To me, the usefulness comes from the longer-term graphs (week, month,
year) which show you how stable the system is and the average uptime. It
is also a good check of munin's network connectivity, as any network
problems will appear as obvious breaks
Hi, I just noticed this bug and have 4 hypervisors affected by it. I
would be more than happy to test the SRU package from -proposed if
someone is kind enough to publish it there again. I will provide quick
test results.
Best regards,
Simon
--
You received this bug notification because you are
Public bug reported:
Steps to reproduce
1) Create a VM
2) Attach 2 IDE CDROM devices
3) Connect a bootable iso to the first CDROM
4) Make sure the VM will attempt to boot from CD first
$ lsb_release -rd
Description:Ubuntu 11.04
Release:11.04
$ apt-cache policy libvirt-bin
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to libvirt in Ubuntu.
https://bugs.launchpad.net/bugs/776620
Title:
Unable to boot from CD when the VM has 2 IDE cdrom attached
--
Ubuntu-server-bugs mailing list
@Serge
Thank you very much for the workaround, it works great. Even when 2
bootable CDROM are connected it's the second one that is used to boot. I
agree that it's a low priority item.
Thanks,
Simon
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is
Public bug reported:
The --defaults-file option of MySQL is not mentioned in the mysql(1) man
page. Maybe this is because it's something specific to Debian and
derivatives. In any case, this option is very useful and should be at
least mentioned in the man page IMHO.
** Affects: mysql-dfsg-5.1
@Chuck,
Completely forgot about this. I noticed this on Lucid but this is also
affecting Natty.
Lucid:
# lsb_release -rd
Description:Ubuntu 10.04.2 LTS
Release:10.04
# apt-cache policy mysql-server-core-5.1
mysql-server-core-5.1:
Installed: 5.1.41-3ubuntu12.10
Candidate:
Public bug reported:
After the log rotation, logrotate needs to notify all samba processes to
release their open file descriptors on the log files.
The current logrotate configuration file does not do so and only notify the
process that has it's PID stored /var/run/samba/.
This is wrong as
Steps to observe the problem :
# Only one log file exists
ls -1 /var/log/samba
cores
log.smbd
# Force the rotation
logrotate -f /etc/logrotate.d/samba
# The log is rotated but the old log file is missing (was rm'ed and does not
show in ls)
ls -1 /var/log/samba
cores
log.smbd.1.gz
# with lsof
** Description changed:
After the log rotation, logrotate needs to notify all samba processes to
release their open file descriptors on the log files.
The current logrotate configuration file does not do so and only notify the
process that has it's PID stored /var/run/samba/.
This is
I opened a new bug (LP: 810736) for those child processes that continue
to log to rotated files.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba in Ubuntu.
https://bugs.launchpad.net/bugs/529290
Title:
logrotate script needs
I have provided the information required by Chuck so I'm setting the
status to new again. Let me know if other information is needed.
** Changed in: mysql-dfsg-5.1 (Ubuntu)
Status: Expired = New
--
You received this bug notification because you are a member of Ubuntu
Server Team, which
Public bug reported:
When there are 2 or more VPN configuration files and one of them does
not use the script-security parameter, the subsequent (alphabetic order)
openvpn process will be called with --script-security 2 no matter what
is the value of the script-security parameter in the
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openvpn in Ubuntu.
https://bugs.launchpad.net/bugs/814164
Title:
The init script does not handle the script-security parameter
correctly when there are multiple configuration files
Here is a patch that make sure the script-security parameter is handle
properly for each VPN configuration files.
** Bug watch added: community.openvpn.net/openvpn/ #118
https://community.openvpn.net/openvpn/ticket/118
** Also affects: openvpn via
I failed to attach the file in my previous comment.
** Patch added: Reset the script_security variable to avoid reusing it for
other VPN configurations
https://bugs.launchpad.net/openvpn/+bug/814164/+attachment/2223644/+files/openvpn-init.patch
--
You received this bug notification because
Regarding the DKMS build error, it seems to be related to the following
entries in the changelog :
- configure option --with-l26 has been renamed --with-linux, and
--with-l26-source has been renamed --with-linux-source. The old
names will be removed after the next release, so
@Ben
Excellent, many thanks
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openvswitch in Ubuntu.
https://bugs.launchpad.net/bugs/829250
Title:
datapath dkms module does't built automaticly
To manage notifications about this bug
1 - 100 of 2423 matches
Mail list logo