Public bug reported:
When a user shares a folder in Nautilus via right-click and selecting "Sharing
Options", no changes are made to smb.conf - I don't know exactly where this
information goes but I assume it's handled via gconf.
This possibly isn't a problem as long as the GUI method works. Whe
I have discovered that using the GUI to share a folder (via right-clicking in
Nautilus) does not make any changes to smb.conf - I'm not sure where the
information is stored, but I'm guessing it's somewhere in gconf (a quick check
in gconf-editor didn't turn it up, but I'm not a gconf expert).
S
** Description changed:
- Reviewing RC bugs from Debian shows 2 CVEs fixed in upstream bug-fix
- release 1.8.13.1, and 2 additional CVEs fixed in latest Debian release.
+ (Tracking some collaborative work with persia)
+
+ A review of RC bugs from Debian shows 4 CVEs fixed in the latest Debian
+ r
[Expired for network-manager-openvpn (Ubuntu) because there has been no
activity for 60 days.]
** Changed in: network-manager-openvpn (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openvpn
[Expired for network-manager (Ubuntu) because there has been no activity
for 60 days.]
** Changed in: network-manager (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openvpn in Ubuntu.
http
[Expired for qemu-kvm (Ubuntu) because there has been no activity for 60
days.]
** Changed in: qemu-kvm (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu-kvm in Ubuntu.
https://bugs.laun
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-3863
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2186
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-4737
--
You received this bug notification because you are a member of Ubun
Hello! I am not able to reproduce this using php5-cli from precise or
quantal. If I add checks using memory_get_usage(), I get a delta of 288
bytes, and then actually 0 delta once ftp_close is called.
Can you provide more information on how you used xdebug to determine it
was ftp_* causing your me
Public bug reported:
Reviewing RC bugs from Debian shows 2 CVEs fixed in upstream bug-fix
release 1.8.13.1, and 2 additional CVEs fixed in latest Debian release.
** Affects: asterisk (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a
Hi Mikko, thanks for filing this report.
I can confirm that the wrong behavior happens on Lucid's php5-cli
package.
I can also confirm that this was resolved upstream in version 5.3.3:
https://bugs.php.net/bug.php?id=52361
These two commits *could* be backported to Lucid's PHP:
http://svn.php
Doug, thanks for responding. I suspect others may be bitten by that
problem if they have modified /etc/mysql/my.cnf
** Changed in: mysql-5.5 (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to mysql-5
** Bug watch added: Debian Bug tracker #614965
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614965
** Also affects: lm-sensors (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614965
Importance: Unknown
Status: Unknown
--
You received this bug notification becaus
Public bug reported:
The log is flooded with messages like this:
Error updating RRD file: /var/log/sensord.rrd: /var/log/sensord.rrd:
found extra data on update argument: 0.08
ProblemType: Bug
DistroRelease: Ubuntu 12.04
Package: sensord 1:3.3.1-2ubuntu1
ProcVersionSignature: Ubuntu 3.2.0-30
This is the tgt conf that specifies the target:
root@server1:/var/log# cat /etc/tgt/conf.d/dag.conf
# Sample target with one LUN only. Defaults to allow access for all initiators:
#
#iSNSServerIP 192.168.122.10
#iSNSServerPort 3205
#iSNSAccessControl On
#iSNS On
backing-store /dev/mapper/s
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to tgt in Ubuntu.
https://bugs.launchpad.net/bugs/1048008
Title:
tgt needs restart to find LUN
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tgt/+
Public bug reported:
I've got a KVM guest running Quantal server (as per CD install 2012-09-01) and
it runs tgtd with a single target
(the target is an LVM lv - I'll attach any configs that apport hasn't attached)
If I just boot the vm, the guests don't see the disc - when they log in they
just
This bug was fixed in the package postfix - 2.9.3-2~12.04.3
---
postfix (2.9.3-2~12.04.3) precise-proposed; urgency=low
* d/rules: Fix apport hook installation (LP: #1038527)
-- Clint ByrumSat, 18 Aug 2012 15:47:35 -0700
** Changed in: postfix (Ubuntu Precise)
Status: F
The verification of this Stable Release Update has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a regression
Have tested with those patches dropped and the upstream behavior is in
fact restored. I've forwarded this on to Debian, though I would consider
carrying this as part of Ubuntu's delta if the Debian maintainers decide
not to revert the patches, as this seems fairly serious to me.
** Bug watch added
It's there.
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to postfix in Ubuntu.
https://bugs.launchpad.net/bugs/1038527
Title:
apport package hook is not installed
** Summary changed:
- [needs-packaging] oprofile 0.9.8
+ [needs-packaging] OProfile 0.9.8
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is a bug assignee.
https://bugs.launchpad.net/bugs/1039871
Title:
[needs-packaging] OProfile 0.9.8
To manage n
Thomas, thanks for reporting the bug!
Indeed, it looks like the local provider, which does its own origin
setup through a script, fails to note all of the deps for juju:
apt-get install $APT_OPTIONS python-txzookeeper python-
setuptools
There is a refactor in progress around using the cl
** Branch linked: lp:ubuntu/precise-proposed/bacula
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to bacula in Ubuntu.
https://bugs.launchpad.net/bugs/1034962
Title:
bacula dependency on bacula-server fails with held broken packages
Hello Douglas, or anyone else affected,
Accepted into precise-proposed. The package will build now and be
available in a few hours in the -proposed repository.
Please help us by testing this new package. See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to
enable and use -
I encountered with this issue when I was trying to destroy a local
environment. I have no problem to bootstrap/deploy service locally.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/930430
Setting to 'High' as this very quietly and subtly reduces the security
of the system.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in Ubuntu.
https://bugs.launchpad.net/bugs/1046330
Title:
Incorrect crypt() function behavior
Sergei, I agree, my comments were misleading. My point is that this has
been broken since at least 10.04, and its not even necessarily a
regression from one release of Ubuntu to another.
I just tested this on Debian squeeze and wheezy and it is present there
as well.I believe this was introduced b
** Branch linked: lp:ubuntu/asterisk
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to asterisk in Ubuntu.
https://bugs.launchpad.net/bugs/1022360
Title:
(CVE-2012-3812) CVE-2012-3812 asterisk: Remote crash vulnerability in
voice mai
** Also affects: asterisk (Ubuntu Precise)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to asterisk in Ubuntu.
https://bugs.launchpad.net/bugs/1022360
Title:
(CVE-2012-3812) CVE-2012-3812 a
This bug was fixed in the package asterisk - 1:1.8.13.1~dfsg-1ubuntu1
---
asterisk (1:1.8.13.1~dfsg-1ubuntu1) quantal; urgency=low
* Merge from Debian unstable. (LP: #1022360, CVE-2012-3812)
Remaining changes:
- debian/asterisk.init: chown /dev/dahdi
- Fix building on ar
I've attached the VM instance's definition and the debugging output from
gdb (which seemed quite minimal). Let me know if you need me to install
debugging symbols for libc as well, or if you need any other data.
--
You received this bug notification because you are a member of Ubuntu
Server Team,
lb1
8ee4c960-184a-fa11-f9e8-292cd904371a
1048576
1048576
1
hvm
destroy
restart
destroy
/usr/bin/kvm
#0 0x7fc1e6d77823 in select () from /lib/x86_64-linux-gnu/libc.so.6
#1 0x7fc1ea661da0 in main_loop_wait (nonblocking=) at
main-loop.c:456
#2 0x7fc1ea5cb5ff in main_loop () at
/build/buildd/qemu-kvm-1.0+noroms/vl.c:1482
#3 main (argc=, argv=, envp=) at
/build/buildd/qemu-kvm-1.0+n
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi Steve
On 07/09/12 16:36, Steve Langasek wrote:
> Hi James,
>
> if status cups >/dev/null ; then start wait-for-state WAITER=smbd
> WAIT_FOR=cups WAIT_STATE=running fi
>
> This solution has the effect that if the cups job is broken for
> any rea
It's true, we should install TGT.
I've updated the packages and it's fixed now. Thank's !
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cinder in Ubuntu.
https://bugs.launchpad.net/bugs/1047059
Title:
Packaging Issues into Ubuntu
The regression is not the absence of CRYPT_EXT_DES algorithm but the
fact that it's declared available (CRYPT_EXT_DES = 1) but not used
(result = _.msUWmoj85W6).
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in Ubuntu.
https://bu
Can confirm that Ubuntu/Debian's behavior is different from CentOS 6:
$ php --version
PHP 5.3.3 (cli) (built: Jul 3 2012 16:53:21)
Copyright (c) 1997-2010 The PHP Group
Zend Engine v2.3.0, Copyright (c) 1998-2010 Zend Technologies
$ php -r "echo 'CRYPT_EXT_DES: ', CRYPT_EXT_DES, PHP_EOL, crypt(
37 matches
Mail list logo