** Also affects: auto-upgrade-testing
Importance: Undecided
Status: New
** Changed in: auto-upgrade-testing
Status: New = In Progress
** Changed in: auto-upgrade-testing
Assignee: (unassigned) = Martin Pitt (pitti)
--
You received this bug notification because you are a
Public bug reported:
Please sync nose 1.3.0-3 (main) from Debian unstable (main)
Explanation of the Ubuntu delta and why it can be dropped:
* d/patches/issue759: Fixes for build failures against Python 3.4.
Applied in Debian.
Changelog entries since current trusty version 1.3.0-2.1ubuntu1:
** Branch linked: lp:auto-upgrade-testing
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1060404
Title:
update-grub runs and fails in containers
To manage notifications about this bug
I applied a workaround for trusty in http://bazaar.launchpad.net/~auto-
upgrade-testing-dev/auto-upgrade-testing/trunk/revision/92 . Not pretty,
but it'll do.
** Changed in: auto-upgrade-testing
Status: In Progress = Fix Released
--
You received this bug notification because you are a
Err, I meant for quantal, not for trusty.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1060404
Title:
update-grub runs and fails in containers
To manage notifications about this bug
*** This bug is a duplicate of bug 988509 ***
https://bugs.launchpad.net/bugs/988509
** This bug has been marked a duplicate of bug 988509
setoption.pl is not executable
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba4 in
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: openssh (Ubuntu)
Status: New = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openssh in Ubuntu.
*** This bug is a duplicate of bug 988509 ***
https://bugs.launchpad.net/bugs/988509
** This bug has been marked a duplicate of bug 988509
setoption.pl is not executable
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba4 in
** Changed in: spamassassin (Debian)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to spamassassin in Ubuntu.
https://bugs.launchpad.net/bugs/538470
Title:
split sa-compile into a separate
Public bug reported:
ubuntu 13.10 64bit
ProblemType: Package
DistroRelease: Ubuntu 13.10
Package: samba4 (not installed)
ProcVersionSignature: Ubuntu 3.11.0-15.25-generic 3.11.10
Uname: Linux 3.11.0-15-generic x86_64
NonfreeKernelModules: nvidia
ApportVersion: 2.12.5-0ubuntu2.2
Architecture:
*** This bug is a security vulnerability ***
Public security bug reported:
A regression has been reported in the patch used to fix CVE-2013-6393 in
USN-2098-1:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=738587
https://bugzilla.redhat.com/show_bug.cgi?id=1033990
Upstream has used
Public bug reported:
php-fpm uses a master process to control its children. the problem is,
that a service reload is going to kill this master process without
recovering it or killing its children.
here is an example:
# ps aux|grep fpm
root 20590 1.3 0.0 190264 22380 ?Ss 14:54
** Changed in: libyaml (Debian)
Status: Unknown = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to libyaml in Ubuntu.
https://bugs.launchpad.net/bugs/1279805
Title:
regression in CVE-2013-6393 patch
To manage
This bug was fixed in the package libyaml - 0.1.4-2ubuntu0.13.10.2
---
libyaml (0.1.4-2ubuntu0.13.10.2) saucy-security; urgency=medium
* SECURITY REGRESSION: parsing regression in security update
(LP: #1279805)
- debian/patches/CVE-2013-6393.patch: updated to use upstream
This bug was fixed in the package libyaml - 0.1.4-2ubuntu0.12.04.2
---
libyaml (0.1.4-2ubuntu0.12.04.2) precise-security; urgency=medium
* SECURITY REGRESSION: parsing regression in security update
(LP: #1279805)
- debian/patches/CVE-2013-6393.patch: updated to use upstream
This bug was fixed in the package libyaml - 0.1.4-2ubuntu0.12.10.2
---
libyaml (0.1.4-2ubuntu0.12.10.2) quantal-security; urgency=medium
* SECURITY REGRESSION: parsing regression in security update
(LP: #1279805)
- debian/patches/CVE-2013-6393.patch: updated to use upstream
Also exists in 13.10- Package info is: PHP 5.5.3-1ubuntu2.1 (fpm-fcgi)
(built: Dec 12 2013 04:24:43)
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in Ubuntu.
https://bugs.launchpad.net/bugs/1230917
Title:
php5-fpm logrotate
** Branch linked: lp:ubuntu/trusty-proposed/libyaml
** Branch linked: lp:ubuntu/precise-security/libyaml
** Branch linked: lp:ubuntu/quantal-security/libyaml
** Branch linked: lp:ubuntu/saucy-security/libyaml
--
You received this bug notification because you are a member of Ubuntu
Server
Blueprint changed by Yolanda Robla:
Work items changed:
Work items for ubuntu-13.11:
[yolanda.robla] Charm Heat: DONE
[james-page] Complete charms for ceilometer: DONE
Work items for ubuntu-13.12:
[james-page] Bundles for OpenStack: DONE
Work items for ubuntu-14.04-alpha-2:
(Note, despite the 'confirmed' status for lxc we can't truly fix it in
lxc until it is fixed in the kernel)
** Changed in: lxc (Ubuntu)
Importance: Undecided = Medium
** Changed in: lxc (Ubuntu)
Status: New = Confirmed
--
You received this bug notification because you are a member of
** Changed in: lxc (Ubuntu)
Status: New = Triaged
** Changed in: lxc (Ubuntu)
Importance: Undecided = High
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1271455
Title:
Thanks for reporting this bug. Can you still reproduce this with 13.10
or with (the in-development) 14.04?
While this could be a userspace bug, it seems more likely to be a bug in
the kernel. It might be worth trying to boot one of the older kernels
and see whether it suspends properly.
**
This should help:
$ git diff HEAD~2
diff --git a/debian/php5-fpm.init b/debian/php5-fpm.init
index b8b2fb3..13485ce 100644
--- a/debian/php5-fpm.init
+++ b/debian/php5-fpm.init
@@ -16,7 +16,7 @@ DESC=PHP5 FastCGI Process Manager
NAME=php5-fpm
DAEMON=/usr/sbin/$NAME
DAEMON_ARGS=--daemonize
And this fix will be included in 5.5.9+dfsg-2 (and when Ubuntu people
merge it to their own copies of src:php5).
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in Ubuntu.
https://bugs.launchpad.net/bugs/1230917
Title:
php5-fpm
** Summary changed:
- Suspend resume immidiatly
+ Suspend resume immediately
** Description changed:
- I have a new install Lubuntu 13.04
- I don't have ever problem with previous release of ubuntu
+ I have a new install of Lubuntu 13.04.
+ I never had a problem with previous releases of
** Changed in: libpam-mount (Ubuntu)
Status: New = Confirmed
** Changed in: libpam-mount (Ubuntu)
Importance: Undecided = Wishlist
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to libpam-mount in Ubuntu.
Thanks for reporting this bug. I've marked it as also affecting the
kernel as that is the more likely place for the fault.
Can you still reproduce this with newer releases?
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu)
Status:
This bug was fixed in the package libyaml - 0.1.4-3ubuntu2
---
libyaml (0.1.4-3ubuntu2) trusty; urgency=medium
* SECURITY REGRESSION: parsing regression in security update
(LP: #1279805)
- debian/patches/CVE-2013-6393.patch: use upstream commits from 0.1.5.
-
Thank you for taking the time to report this bug and helping to make
Ubuntu better. We are sorry that we do not always have the capacity to
look at all reported bugs in a timely manner. There have been many
changes in Ubuntu since that time you reported the bug and your problem
may have been fixed
This bug was fixed in the package libvirt - 1.2.1-0ubuntu7
---
libvirt (1.2.1-0ubuntu7) trusty; urgency=low
* debian/patches/nwfilter-locking.patch: Dropped causes ftbfs.
-- Chuck Short zul...@ubuntu.com Thu, 13 Feb 2014 10:07:56 -0700
** Changed in: libvirt (Ubuntu)
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v3.13 kernel[0].
If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.
If the mainline kernel does not fix
** Changed in: nova/havana
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1180044
Title:
nova failures when vCenter has multiple
sponsored with a minor email change
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to open-vm-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1272196
Title:
vmhgfs doesn't work with linux 3.13 kernel
To manage notifications about
** Branch unlinked: lp:~rcj/ubuntu/trusty/open-vm-tools/lp1274157
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to open-vm-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1272196
Title:
vmhgfs doesn't work with linux 3.13 kernel
To
** Changed in: open-vm-tools (Ubuntu)
Status: In Progress = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to open-vm-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1272196
Title:
vmhgfs doesn't work with linux
** Branch linked: lp:ubuntu/trusty-proposed/open-vm-tools
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to open-vm-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1272196
Title:
vmhgfs doesn't work with linux 3.13 kernel
To manage
Fixed (from Debian) in 3.3.2-8ubuntu1 for Trusty (14.04).
** Changed in: server-papercuts
Status: Fix Committed = Fix Released
** Changed in: spamassassin (Ubuntu)
Status: Triaged = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team,
The change is in the code, and according to
https://wiki.ubuntu.com/StableReleaseUpdates/MicroReleaseExceptions:
For MRE packages only, it can generally be assumed that bugs claimed to be
fixed have actually been fixed upstream, and it is not necessary to manually
independently verify them.
The verification of the Stable Release Update for openvswitch has
completed successfully and the package has now been released to
-updates. Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you
This bug was fixed in the package openvswitch - 1.4.6-0ubuntu1.12.04.2
---
openvswitch (1.4.6-0ubuntu1.12.04.2) precise; urgency=low
* d/p/0010-datapath_ip_select_ident_fix.patch: linux commit 703133de changes
the first parameter of ip_select_ident from iph to skb (LP:
This bug was fixed in the package openvswitch - 1.4.6-0ubuntu1.12.04.2
---
openvswitch (1.4.6-0ubuntu1.12.04.2) precise; urgency=low
* d/p/0010-datapath_ip_select_ident_fix.patch: linux commit 703133de changes
the first parameter of ip_select_ident from iph to skb (LP:
This bug was fixed in the package openvswitch - 1.4.6-0ubuntu1.12.04.2
---
openvswitch (1.4.6-0ubuntu1.12.04.2) precise; urgency=low
* d/p/0010-datapath_ip_select_ident_fix.patch: linux commit 703133de changes
the first parameter of ip_select_ident from iph to skb (LP:
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
https://bugs.launchpad.net/bugs/1254034
Title:
txlongpoll.yaml contains password but is world
Public bug reported:
jlquinn@wyvern:~$ lsb_release -rd
Description:Ubuntu 13.10
Release:13.10
I log into work over an ATT vpn. When I upgraded my client to Ubuntu 13.10, I
was unable to ssh into my work machines. The ssh version upgrade was
2014-02-06 12:45:05 upgrade
Blueprint changed by James Page:
Work items changed:
Work items for ubuntu-13.12:
Setup PPA for Percona packaging pre-entry into Debian/Ubuntu: DONE
[otto] Package mariadb 5.5 for Debian: DONE
Work items for ubuntu-14.02:
[george] Percona Server 5.5 5.6 package - Debian: INPROGRESS
juju-mongodb needs a team bug subscriber
** Changed in: juju-mongodb (Ubuntu)
Status: New = Incomplete
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
https://bugs.launchpad.net/bugs/1267393
Title:
[MIR]
golang needs a team bug subscriber
** Changed in: golang (Ubuntu)
Status: New = Incomplete
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
https://bugs.launchpad.net/bugs/1267393
Title:
[MIR] juju-core,
gccgo-go needs a team bug subscriber
** Changed in: gccgo-go (Ubuntu)
Status: New = Incomplete
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to juju-core in Ubuntu.
https://bugs.launchpad.net/bugs/1267393
Title:
[MIR]
+1. In a very related vein, the init script exits with status 4 when it
tries to start an already-running haproxy. Both the stop and start
behaviors are non-standard LSB: http://linux-
ha.org/wiki/LSB_Resource_Agents
--
You received this bug notification because you are a member of Ubuntu
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: haproxy (Ubuntu)
Status: New = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to haproxy in Ubuntu.
Public bug reported:
Please sync nbd 1:3.7-1 (main) from Debian unstable (main)
Explanation of the Ubuntu delta and why it can be dropped:
* Fix tests failing on 32bit architectures. Closes: #735258.
* Merge from Debian unstable. Remaining changes:
- Drop /etc/modprobe.d/nbd-client; the
Public bug reported:
Windows name-resolution does not work out-of-the-box on kubuntu and ubuntu
desktop images.
Therefore I'd like to propose that libnss-winbind should be installed
per default on desktop images. I will make WINS name resolution work out
of the box which is something that you
Public bug reported:
Windows name-resolution does not work out-of-the-box on kubuntu and ubuntu
desktop images.
Therefore I'd like to propose that libnss-winbind should be installed
per default on desktop images. I will make WINS name resolution work out
of the box which is something that you
It's almost certanly MTU problem. Just try
ip li set mtu 1200 dev tap0 (or tun0)
to test
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1254085
Title:
ssh fails to connect to VPN
This bug was fixed in the package cobbler - 2.4.1-0ubuntu1
---
cobbler (2.4.1-0ubuntu1) trusty; urgency=medium
* Merge from unreleased debian git
- new upstream release (LP: #1278898)
-- Timo Aaltonen tjaal...@ubuntu.com Thu, 13 Feb 2014 23:24:48 +0200
** Changed in:
Public bug reported:
On Ubuntu 13.10 x86 PHP is not compiled with Large File Support making
it impossible to open files larger than 4 GiB.
The root cause of this seems to be that getconf LFS_CFLAGS returns an
empty string which is used in debian/rules to determine whether LFS
supports should be
Public bug reported:
Ubuntu Release: 14.04
samba version: 2:4.1.3+dfsg-2ubuntu2
Trying to use a Samba VFS (.so) that has been compiled somewhere else.
[2014/02/13 16:35:01.660431, 0] ../lib/util/modules.c:48(load_module)
Error loading module '/usr/lib/x86_64-linux-gnu/samba/vfs/greyhole.so':
This FTBFS for me... Could you please look into this, and adjust the bug
accordingly when a solution is ready to be submitted. Please re-
subscirbe ubuntu-sponsors when ready.
Thanks.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to
Hrm ok, second time worked. I don't know what I did incorrectly there,
please disregard my previsou message.
** Changed in: nose (Ubuntu)
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nose in
This bug was fixed in the package nose - 1.3.0-3
Sponsored for Dmitry Shachnev (mitya57)
---
nose (1.3.0-3) unstable; urgency=medium
* Team upload.
* d/patches/issue759: Add a patch from Barry Warsaw to fix FTBFS
with Python 3.4.
* d/control: Bump Standards-Version to
Your changelog entries that are suposedly dropped are confusing me. I
can't find any mention of them in the trusty changelog, and what is
more, the debian package has a modprobe.d file for nbd-client.
So at a glance, this appears to be to be a merge, not a sync.
Please clarrify, and re-subscribe
And another Panic action today. Details below.
-
The Samba 'panic action' script, /usr/share/samba/panic-action,
was called for PID 24852 (/usr/sbin/smbd).
This means there was a problem with the program, such as a segfault.
Below is a backtrace for this
62 matches
Mail list logo