://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-discuss
[1] http://lists.openstack.org/pipermail/openstack/2018-September/047005.html
--
Jeremy Stanley
signature.asc
Description: PGP signature
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman
o them
over the next week.
[0] http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-discuss
[1]
http://lists.openstack.org/pipermail/openstack-dev/2018-September/134911.html
--
Jeremy Stanley
signature.asc
Description: PGP signature
___
Mai
case either might be resulting in
subscribers missing it.
[0] http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-discuss
[1]
http://lists.openstack.org/pipermail/openstack-dev/2018-September/134911.html
--
Jeremy Stanley
signature.asc
Description: PGP sign
opics
Which is its initial location for crowd-sourcing/brainstorming, but
will get published to a more durable location like on
lists.openstack.org itself or perhaps the Project-Team Guide once
the list is in use.
--
Jeremy Stanley
signature.asc
Description: PGP signature
are closed
down for good).
[0] http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-discuss
[1]
http://lists.openstack.org/pipermail/openstack-dev/2018-September/134911.html
--
Jeremy Stanley
signature.asc
Description: PGP signature
___
Ma
openstack.org/#!/project_group/openstackclient
instead.
--
Jeremy Stanley
signature.asc
Description: PGP signature
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : openstack@lists.openstack.org
Unsubscribe :
good).
[0] http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-discuss
[1]
http://lists.openstack.org/pipermail/openstack-dev/2018-September/134911.html
--
Jeremy Stanley
signature.asc
Description: PGP signature
___
Mailing
ance team has been asked to look into. See also the rather
lengthy troubleshooting discussion on the Operators ML starting
here:
http://lists.openstack.org/pipermail/openstack-operators/2018-October/016039.html
--
Jeremy Stanley
signature.asc
Description: PGP
the first which comes to mind for me is the
Massachusetts Institute of Technology:
https://tig.csail.mit.edu/shared-computing/open-stack/
--
Jeremy Stanley
signature.asc
Description: PGP signature
___
Mailing list: http://lists.openstack.org/
t; Local meetups/events, we discussed putting that here as well.
It seems a fine plan, just keep in mind that documenting and
publishing feedback doesn't magically translate into developers
acting on any of it (and this is far from the first time it's been
nfra-ptg-denver-2018
[4] https://www.ietf.org/rfc/rfc2369.txt
[5] https://etherpad.openstack.org/p/common-openstack-ml-topics
--
Jeremy Stanley
signature.asc
Description: PGP signature
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listin
On 2018-09-13 13:32:27 + (+), Jeremy Stanley wrote:
> On 2018-09-13 15:27:51 +0900 (+0900), Bernd Bausch wrote:
> [...]
> > To add insult to injury, when I click on the bug icon of the user
> > guide page, I am told "Launchpad doesn't know what
r-friendly if they at least linked
https://storyboard.openstack.org/#!/project/openstack/magnum instead
of the base URL for SB on that main project page, but hopefully it's
enough for most people to find what they're looking for.
--
Jeremy Stanle
pointed out we
don't usually tell them to take their questions elsewhere any more).
--
Jeremy Stanley
signature.asc
Description: PGP signature
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : opensta
tough, but luckily MIT's
listadmins have posted some so we don't need to:
http://web.mit.edu/lists/mailman/topics.html
--
Jeremy Stanley
signature.asc
Description: PGP signature
___
Mailing list: http://lists.openstack.org/c
welcome
message, or merely linked to a published document (and whether
that's best suited for the Infra Manual or New Contributor Guide or
somewhere else entirely is certainly up for debate), or even
potentially both.
--
Jeremy Stanley
signature
way, come to understand it, and
become part of that process. Requiring them to have their
conversations elsewhere sends the opposite message.
--
Jeremy Stanley
signature.asc
Description: PGP signature
___
Mailing list: http://lists.openstack.
ve a *lot*
of "black hole" subscribers who aren't actually following that list
but whose addresses aren't bouncing new posts we send them for any
of a number of possible reasons.
--
Jeremy Stanley
signature.asc
Description: PGP signature
___
support in
Mailman unless we can somehow work with them to help in
reimplementing it.
--
Jeremy Stanley
signature.asc
Description: PGP signature
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : openstack@lists.op
he irony of cross-posting this
message to four mailing lists is not lost on me. ;)
[1] https://etherpad.openstack.org/p/YVR-ops-devs-one-community
[2] https://etherpad.openstack.org/p/common-openstack-ml-topics
--
Jeremy Stanley
signature.asc
Description: PGP signature
__
t into
1.27.0? At a minimum I think we'll want to get
https://review.openstack.org/593670 and its parent change merged so
that the release note about -c going away will be included in the
release. Anything else?
--
Jeremy Stanley
signature.asc
Description: PGP signature
for reporting!
> Can someone investigate or escalate this to the right place?
A more appropriate list would have been
openstack-in...@lists.openstack.org (Cc'd on my reply).
--
Jeremy Stanley
signature.asc
Description: PGP signature
___
Mailing
conflict with
dependencies of some OpenStack service, so you can't necessarily
expect to be able to co-install them on the same machine without
some means of context separation (virtualenvs, containers, pip
install --local, et cetera).
--
Jeremy Stanley
signature.asc
Description:
r client lib.
[...]
Or, for that matter, leverage OpenStackSDK's ability to pass
arbitrary calls to individual service APIs when you need something
not exposed by the porcelain layer.
--
Jeremy Stanley
signature.asc
Description: PGP signature
___
M
other, and tend to eventually drop
support for older OpenStack APIs so if you're going to be
interacting with a variety of different OpenStack deployments built
on different releases you may need multiple versions of the client
libraries (depending on what it is you're trying to do).
--
Je
On 2018-02-01 14:58:46 -0500 (-0500), Satish Patel wrote:
> Interesting survey but if i am not wrong Fuel is end of life and they
> stopped development right?
[...]
Sure, but that doesn't mean people aren't still running environments
deployed with it.
--
Jeremy Stanley
On 2018-02-01 19:21:03 + (+), Jeremy Stanley wrote:
> On 2018-02-01 19:15:51 +0400 (+0400), Fawaz Mohammed wrote:
> > TripleO (Supported on CentOS and RHEL) and Juju (Supported on
> > Ubuntu) [1] are the most used OpenStack deployment tools.
> [...]
>
> Most
k User Survey from April 2017 (page
42) at least, which claims that more deployments used Ansible (45%),
Puppet (28%), Fuel (16%) and Chef (14%) than Juju (9%). TripleO
didn't even have enough responses on that question to rank.
https://www.openstack.org/assets/survey/April2017SurveyReport.pdf
there.
--
Jeremy Stanley
signature.asc
Description: PGP signature
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : openstack@lists.openstack.org
Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
lists. Thanks!
--
Jeremy Stanley
signature.asc
Description: PGP signature
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : openstack@lists.openstack.org
Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/li
ontact
listed in the cn TLD whois DB rather than a random discussion
mailing list, and the sender's address seems to be at a throw-away
domain which doesn't match the more official-looking address in
their signature at all).
--
Jeremy Stanley
signature.asc
Descriptio
https://review.openstack.org/523214 (Pike)
- https://review.openstack.org/521662 (Queens)
Credits
~~~
- Matt Riedemann from Huawei (CVE-2017-17051)
References
~~
- https://launchpad.net/bugs/1732976
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17051
--
Jeremy Stanley
Open
n these above Feature requests.
Can you elaborate on what you feel is missing from the above linked
services? It's difficult to determine from your terse message
whether you're simply unaware these already exist, or you find them
lacking in some way for your particular use case.
--
Je
use the
E-mail address it was poorly attempting to pretend to come from).
The actual sender's address (anna.osi...@uniwar.pl) doesn't even
seem to be subscribed to this list, so I have to assume one of the
list moderators accidentally approved the message by mistake.
--
Jeremy Stan
s a lot of sense to me, as a privacy/security-conscious
sysadmin.
--
Jeremy Stanley
signature.asc
Description: Digital signature
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : openstack@lists.open
look around https://security.openstack.org/ for our lists of
announced vulnerabilities, some of our security-oriented community
processes, and summaries of security-related software/tools under
development.
--
Jeremy Stanley
signature.asc
Description:
and it'll
just flat refuse to update it. In those sorts of situations I've
pretty much always sent the server back or requested appropriate
replacement parts to service it myself on site.
--
Jeremy Stanley
signature.asc
Description: Digital signature
_
will queue at the senders' MTAs
until the server is back in service and so should not result in any
obvious disruption.
Apologies for cross-posting so widely, but we wanted to make sure
copies of this announcement went to most of our higher-traffic
lists.
--
Jeremy Stanley
signatur
ble:
http://git.openstack.org/cgit/openstack-infra/system-config/tree/tools/who-approves.py
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : openstack@lists.openstack.org
Unsubscribe : h
messages bound for the server will
queue at the senders' MTAs until the server is back in service and
so should not result in any obvious disruption.
Apologies for cross-posting so widely, but we wanted to make sure
copies of this announcement went to most of our higher-traffic
lists.
--
J
ack-gate framework we use at
http://git.openstack.org/cgit/openstack-infra/devstack-gate/tree/README.rst
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : openstack@lists.openstack.o
mysql-client, mysql-server,
postgresql, postgresql-client) which I guess might explain why I
only ran 66 tests instead of 136, though the failures you quoted
didn't look like they were related to any tests which would have
needed those.
--
Jeremy Stanley
7214)
References
~~
- https://launchpad.net/bugs/1673569
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7214
--
Jeremy Stanley
OpenStack Vulnerability Management Team
signature.asc
Description: Digital signature
___
Mailing list: http://l
m IBM (CVE-2017-2592)
References
~~
- https://launchpad.net/bugs/1628031
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2592
--
Jeremy Stanley
signature.asc
Description: Digital signature
___
Mailing list: http://lists.openst
may receive rather
than passing them through untouched).
[*] https://launchpad.net/bugs/1563954
--
Jeremy Stanley
signature.asc
Description: Digital signature
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to
he system is attempting to prevent you
signing up for duplicate accounts. Each member should have one and
only one account in our foundation member system. Update the
affiliations list in your current account's profile (as described
above) rather than creating a new account.
--
Jer
2)
References
~~
- https://launchpad.net/bugs/1449062
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5162
Notes
~
- Separate Ocata patches are listed for Cinder and Glance, as they
were fixed during the Newton release freeze after it branched from
master.
--
Jeremy St
cerns or want additional information on
this maintenance.
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : openstack@lists.openstack.org
Unsubscribe : http://lists.openstack.org/cgi-bin/ma
ng OpenStack trademarks/logo
without authorization.
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : openstack@lists.openstack.org
Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
PBR can already handle like calculating patchsets since the
last tag and translating to suitable Debian package version numbers.
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : openstack@lists.openstack.org
Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
tool to list it. If the pbr library is installed into
your environment, it includes an executable "pbr" entrypoint with a
"freeze" subcommand with output similar to pip freeze except
indicating the abbreviated Git SHAs included from the pbr.json file
in each corresponding egg-inf
e
problem by configuring your ~/.ssh/config file with something like:
Host openstack-gerrit
HostName review.openstack.org
User myGerritUsername
Hope that helps!
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-bi
to the
default ephemeral ports range for the Linux kernel, so chances are
you'd run into the same nondeterministic deployment failures they
did.
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openst
On 2016-04-19 14:30:03 + (+), CHOW Anthony wrote:
> List of OpenStack python clients can be found here:
>
> https://wiki.openstack.org/wiki/OpenStackClients
[...]
Also see http://developer.openstack.org/ for a broader SDK portal.
--
Jerem
ion Working Group which holds
periodic meetings (via conference call I think?) with a roster and
minutes linked from
https://wiki.openstack.org/wiki/Foundation/ProfessionalCertification
(and I also see a contact E-mail address listed at the end of that
oundation, outlines
what they recognized then as remaining deficiencies in openness (but
in my opinion was an unfortunate matter of too little too late):
http://buildacloud.org/blog/125-cloudstack-process-changes-working-the-apache-way.html
>
--
Jeremy Stanley
_
an existing official OpenStack project or form a new official
OpenStack project. The TC may at some point decide to make this a
more formal expectation, but for now there is no requirement to
obtain any official status for your project.
[*] http://lists.openstack.or
ed how (if at all)
you're using OpenStack in your network.
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : openstack@lists.openstack.org
Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
hours, so expect to find it up and
running again by 18:30 UTC.
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : openstack@lists.openstack.org
Unsubscribe : http://lists.openstack.org/cgi-bin
r processes and customs are infantile. It's not
constructive at all. Further, we should pick one mailing list on
which to have this discussion rather than cross-posting to four.
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-bi
: Connection
> refused
There is not, nor has there ever been, an https://docs.openstack.org
site. What you want is http://docs.openstack.org instead.
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/op
ll
maintaining consistent behavior. To that end, I'm Cc'ing the
openstack-dev list, setting MFT and tagging the subject accordingly.
[1] https://launchpad.net/bugs/1409142
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-b
se some zuul/tempest's
> core/maintainer to check this issue.
We've been working on it all day. Pip 6.0 was released today and
it's taken most of the day to get DevStack working correctly with
it. Should finally be resolved now, if you try
should work with Setuptools 8)
or wait until https://review.openstack.org/142931 merges.
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : openstack@lists.openstack.org
Unsubscribe : htt
point release.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8750
https://launchpad.net/bugs/1357372
--
Jeremy Stanley
OpenStack Vulnerability Management Team
signature.asc
Description: Digital signature
___
Mailing list:
ssions. Please do
not post the same question to multiple mailing lists solely to
broaden its audience.
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : openstack@lists.openstack.org
Unsubscribe
ronments at this point... Icehouse has been
available for months and Juno is just around the corner now.
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : openstack@lists.openstack.org
Unsubscribe :
when we spotted it I don't see
any evidence it's happening now. So you're right it shouldn't be the
case. I've at least dug up a change which got quickly cancelled by a
new patchset before any jobs began, and confirmed they never ended
up running on any Jenkins masters
auses the current one to get dequeued,
Jenkins can end up running those jobs anyway.
Did we ever end up implementing a solution for that, or does that
behavior still exist?
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/li
On 2014-06-27 11:30:48 + (+), Jeremy Stanley wrote:
> It's entirely likely you've discovered the behavior described in
> https://launchpad.net/bugs/1043886 (if so, then yes, a known issue).
Actually, I meant to say https://launchpad.net/bugs/1316822 but the
first one is w
service restarts?
>
> Not as far as I know. Security groups are meant to be persistent by
> design. You don't need to do anything.
It's entirely likely you've discovered the behavior described in
https://launchpad.net/bugs/1043886 (
uot;In order to fully leverage a race track, you need a race
car." However, that doesn't mean your unmodified family sedan will
be slower on a race track than on the highway.
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-bin/mai
s as in a non-"cloud" deployment).
Yes, to take advantage of modern concepts like automatic elastic
scaling you may need applications which support those sorts of
deployment methods, but under the hood OpenStack provides virtual
machines--so if your needs can be met on VMs then they're pro
2013.2.4 and 2014.1.1 releases.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2573
https://launchpad.net/bugs/1269418
--
Jeremy Stanley
OpenStack Vulnerability Management Team
signature.asc
Description: Digital signature
On 2014-04-18 08:20:59 +0530 (+0530), Rajdeep Dua wrote:
> How do i get that CL reviewed?
Try reaching out to the core reviewers for that project if it's not
getting attention:
https://review.openstack.org/#/admin/groups/183,members
--
Jeremy
kforge/stackalytics/tree/etc/default_data.json
or one of the other files in the same directory.
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : openstack@lists.openstack.org
Unsubscribe
released with the corresponding patch included.
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : openstack@lists.openstack.org
Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/
://review.openstack.org/72473
Notes:
This fix will be included in the icehouse-2 development milestone
and the upcoming 2013.2.2 release.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1948
https://launchpad.net/bugs/1275062
--
Jeremy Stanley
OpenStack Vulnerability
letely block this?
[...]
Is it possible the user for Tenant A is an admin account? Remember,
admins are global administrators regardless of what tenant they
might be associated with.
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cg
ed mostly by the level of
activity in the community working to provide that support, after
all.
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : openstack@lists.openstack.org
Unsubscribe :
https://launchpad.net/bugs/1247675
--
Jeremy Stanley
OpenStack Vulnerability Management Team
signature.asc
Description: Digital signature
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : openstack@lists.openstac
-6391
https://launchpad.net/bugs/1242597
--
Jeremy Stanley
OpenStack Vulnerability Management Team
signature.asc
Description: Digital signature
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : open
https://review.openstack.org/61437 (nova)
Notes:
This fix will be included in the icehouse-2 development milestone
and in a future 2013.2.1 release.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6419
https://launchpad.net/bugs/1235450
--
Jeremy Stanley
OpenStack Vulnerability Management
https://review.openstack.org/61456
Notes:
This fix will be included in the icehouse-2 development milestone
and in a future 2013.2.1 release.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6428
https://launchpad.net/bugs/1256983
--
Jeremy Stanley
OpenStack Vulnerability Management
nstack.org/61452
Havana fix:
https://review.openstack.org/61454
Notes:
This fix will be included in the icehouse-2 development milestone
and in a future 2013.2.1 release.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6426
https://launchpad.net/bugs/1256049
--
Jeremy Stanley
nstack.org/61452
Havana fix:
https://review.openstack.org/61454
Notes:
This fix will be included in the icehouse-2 development milestone
and in a future 2013.2.1 release.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6426
https://launchpad.net/bugs/1256049
--
Jeremy Stanley
ers for your compute nodes from Apple. Otherwise they won't
license the OS to you, virtual or not.
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : openstack@lists.openstack.org
U
nguage=en_US&cmd=displayKC&externalId=1000131
>
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : openstack@lists.openstack.org
Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
this driver? Or is there some middle
ground to keeping the code intact in Grizzly/Havana but not really
supporting it?
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : openstack@lis
g/cgi-bin/cvename.cgi?name=CVE-2013-4497
https://launchpad.net/bugs/1073306
https://launchpad.net/bugs/1202266
--
Jeremy Stanley
OpenStack Vulnerability Management Team
signature.asc
Description: Digital signature
___
Mailing list:
one. Just a thought.
> Anyway, here's cheers to all the non-core reviewers :)
Hear hear!
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : openstack@lists.openstack.org
hour at the moment, and do it all on virtual
machines managed by other OpenStacks.
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : openstack@lists.openstack.org
Unsubscribe : http://lists.openst
/bugs/1198185
--
Jeremy Stanley
OpenStack Vulnerability Management Team
signature.asc
Description: Digital signature
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : openstack@lists.openstack.org
Unsubscribe
a-2 development milestone and will
appear in a future 2013.1.3 release.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2256
https://bugs.launchpad.net/nova/+bug/1194093
--
Jeremy Stanley
OpenStack Vulnerability Management Team
signature.asc
Description: Di
uture 2013.1.3 release.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4185
https://bugs.launchpad.net/nova/+bug/1184041
--
Jeremy Stanley
OpenStack Vulnerability Management Team
signature.asc
Description: Digital signature
___
Ma
e Debian-OpenStack Team's
Alioth list, .
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to : openstack@lists.openstack.org
Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
er base of the migrated list. Queue settings are being
tweaked to chew through the delivery backlog and get things back on
track, so hopefully should be much quicker soon.
--
Jeremy Stanley
___
Mailing list: http://lists.openstack.org/cgi-bin/mailman/list
97 matches
Mail list logo