to increase the "net.core.rmem_max" and
"net.core.wmem_max"values equally until the "routing socket reports: No
buffer space available" message no longer showed up.
[1] 1:4.2.6.p3+dfsg-1ubuntu3.4+20150820lp1481388~2
https://launchpad.net/~eric-desrochers-z/+archive/ubuntu/lp14
** Changed in: ntp (Ubuntu Precise)
Assignee: (unassigned) => Eric Desrochers (eric-desrochers-z)
** Changed in: ntp (Ubuntu Vivid)
Assignee: (unassigned) => Eric Desrochers (eric-desrochers-z)
** Changed in: ntp (Ubuntu Precise)
Status: New => Confirmed
--
You rece
** Changed in: ntp (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: ntp (Ubuntu Vivid)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/14
debdiff for precise
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1481388
Title:
NTP : Use-after-free in routing socket code after dropping root
To manage notifications about this bu
debdiff for precise
** Patch added: "debdiff for precise"
https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1481388/+attachment/4452908/+files/lp1481388_precise.debdiff
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug repor
debdiff for precise
** Description changed:
+ [Impact]
+
+ * User experienced repeated segfaults at the same instruction pointer
+
+ i/o error on routing socket No buffer space available - disabling
+ segfault at 31 ip 0031 sp 79f11788 error 14 in
libpthread-2.15.so[7f967
debdiff for precise
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1481388
Title:
NTP : Use-after-free in routing socket code after dropping root
To manage notifications about this bu
I also noticed the situation can be reproduced at boot if the value of
"net.core.rmem_default" is too low.
I reproduced it by only lowering the "net.core.rmem_default = 2000"
value with 6 network interface at boot.
ntpd[851]: ntp_io: estimated max descriptors: 1024, initial socket boundary: 16
nt
debdiff for trusty
** Patch added: "1:4.2.6.p5+dfsg-3ubuntu2.14.04.4"
https://bugs.launchpad.net/ubuntu/precise/+source/ntp/+bug/1481388/+attachment/4453392/+files/lp1481388_trusty.debdiff
** Changed in: ntp (Ubuntu Trusty)
Status: Confirmed => In Progress
** Changed in: ntp (Ubuntu T
debdiff for Vivid
** Patch added: "debdiff for Vivid"
https://bugs.launchpad.net/ubuntu/precise/+source/ntp/+bug/1481388/+attachment/4455714/+files/lp1481388_vivid.debdiff
** Changed in: ntp (Ubuntu Vivid)
Status: Confirmed => In Progress
** Changed in: ntp (Ubuntu Vivid)
Importanc
** Patch removed: "debdiff for Vivid"
https://bugs.launchpad.net/ubuntu/vivid/+source/ntp/+bug/1481388/+attachment/4455714/+files/lp1481388_vivid.debdiff
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.l
debdiff for vivid
** Patch added: "debdiff for vivid"
https://bugs.launchpad.net/ubuntu/vivid/+source/ntp/+bug/1481388/+attachment/4456186/+files/lp1481388_vivid.debdiff
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug repor
debdiff for wily
** Patch added: "debdiff for wily"
https://bugs.launchpad.net/ubuntu/vivid/+source/ntp/+bug/1481388/+attachment/4456187/+files/lp1481388_wily.debdiff
** Changed in: ntp (Ubuntu Wily)
Status: Confirmed => In Progress
--
You received this bug notification because you a
** Changed in: ntp (Ubuntu Wily)
Importance: Low => Medium
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1481388
Title:
NTP : Use-after-free in routing socket code after dropping r
Simon, you may want to add a few ethernet interfaces and static routes.
I was able to reproduce it with ~6 network interface.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1481388
Tit
** Changed in: tgt (Ubuntu Trusty)
Importance: Undecided => High
** Changed in: tgt (Ubuntu Trusty)
Status: New => Confirmed
** Changed in: tgt (Ubuntu Trusty)
Assignee: (unassigned) => Eric Desrochers (eric-desrochers-z)
--
You received this bug notification because
https://launchpad.net/~eric-desrochers-z/+archive/ubuntu/tgt1498697
[2] 6c4ffa0 tgtadm: fix a bug to read the response buffer
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to tgt in Ubuntu.
https://bugs.launchpad.net/bugs/1498697
** Tags added: verification-done
** Changed in: tgt (Ubuntu Trusty)
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to tgt in Ubuntu.
https://bugs.launchpad.net/bugs/1498697
Title:
Targets are no
debdiff for Trusty
** Description changed:
+ SRU JUSTIFICATION
+
+ [Impact]
+
+ * tgtadm returns inconsistents results. Some targets are not
+listed during one run, but are shown by a run immediately after.
+
+ [Test Case]
+
+ * With large number of targets :
+
+ # ./tgtadm -L iscsi -
debdiff for Vivid
** Changed in: tgt (Ubuntu Vivid)
Status: New => Confirmed
** Changed in: tgt (Ubuntu Vivid)
Assignee: (unassigned) => Eric Desrochers (eric-desrochers-z)
** Changed in: tgt (Ubuntu Vivid)
Importance: Undecided => High
** Changed in: tgt (Ubu
debdiff for Precise
** Changed in: tgt (Ubuntu Precise)
Status: New => In Progress
** Changed in: tgt (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: tgt (Ubuntu Precise)
Assignee: (unassigned) => Eric Desrochers (eric-desrochers-z)
** Patch added: &qu
** Tags added: sts
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to tgt in Ubuntu.
https://bugs.launchpad.net/bugs/1498697
Title:
Targets are not consistently shown with large numbers of targets
To manage notifications about this bug
2nd debdiff for Vivid (Fixing the unmet depencies of "libibverbs-dev")
** Patch added: "2nd debdiff for Vivid"
https://bugs.launchpad.net/ubuntu/trusty/+source/tgt/+bug/1498697/+attachment/4480119/+files/lp1498697_vivid2.debdiff
--
You received this bug notification because you are a member
Hi Brian,
I got a discussion with arges yesterday about it.
vivid version of tgt didn't build with this error :
sbuild-build-depends-tgt-dummy : Depends: libibverbs-dev (>= 1.1.8-1ubuntu1.1)
but 1.1.8-1ubuntu1 is to be installed
I think it has something to do with this LP patch :
LP: https://b
As per our irc conversation, I'm removing the "2nd debdiff for Vivid"
and arges will re-upload the fix with the original patch I posted for
Vivid.
Sorry for the confusion, and thanks Brian for you feedbacks on this.
** Patch removed: "2nd debdiff for Vivid"
https://bugs.launchpad.net/ubuntu/t
Source version has been modified for version "1:1.0.17-1ubuntu2.1".
Thanks !
** Patch added: "debdiff for Precise-2"
https://bugs.launchpad.net/ubuntu/+source/tgt/+bug/1498697/+attachment/4482207/+files/lp1498697-precise-2.debdiff
--
You received this bug notification because you are a memb
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to tgt in Ubuntu.
https://bugs.launchpad.net/bugs/1498697
Title:
Targets are not consistently shown with large numbers
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1481388
Title:
NTP : Use-after-free in routing socket code after dr
Good evening Chris,
This bug has been brought to my attention by someone in the community.
Unfortunately, I never had a confirmation from him if the fix solve his
issue or not... but as state in comment #5 & #11, I've been able to
reproduce the problem and make sure it addressed the situation.
Th
Good evening Mathew,
Does it mean I need to re-do the debdiffs ?
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1481388
Title:
NTP : Use-after-free in routing socket code after droppi
Hi Mathew,
I have the knowledge of the code, I will rebase the debdiffs for V/T/P
Note: I checked and Xenial has the patch already.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/148138
** Patch removed: "debdiff for precise"
https://bugs.launchpad.net/ubuntu/vivid/+source/ntp/+bug/1481388/+attachment/4452908/+files/lp1481388_precise.debdiff
** Patch removed: "debdiff for trusty"
https://bugs.launchpad.net/ubuntu/vivid/+source/ntp/+bug/1481388/+attachment/4453392/+files/l
Here is the rebase debdiff for Precise
** Patch added: "Rebase Precise debdiff"
https://bugs.launchpad.net/ubuntu/vivid/+source/ntp/+bug/1481388/+attachment/4508496/+files/lp1481388_rebase_precise.debdiff
--
You received this bug notification because you are a member of Ubuntu
Server Team, w
Here is the rebase debdiff for Trusty
** Patch added: "Rebase Trusty debdiff"
https://bugs.launchpad.net/ubuntu/vivid/+source/ntp/+bug/1481388/+attachment/4508494/+files/lp1481388_rebase_trusty.debdiff
--
You received this bug notification because you are a member of Ubuntu
Server Team, whic
Here is the rebase debdiff for Vivid
** Patch added: "Rebase Vivid debdiff"
https://bugs.launchpad.net/ubuntu/vivid/+source/ntp/+bug/1481388/+attachment/4508498/+files/lp1481388_rebase_vivid.debdiff
--
You received this bug notification because you are a member of Ubuntu
Server Team, which i
** Tags added: sts
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1481388
Title:
NTP : Use-after-free in routing socket code after dropping root
To manage notifications about this bug
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1481388
Title:
NTP : Use-after-free in routing socket code after dr
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1481388
Title:
NTP : Use-after-free in routing socket code after dr
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to tgt in Ubuntu.
https://bugs.launchpad.net/bugs/1498697
Title:
Targets are not consistently shown with large numbers
* Changed in: ntp (Ubuntu Precise)
Assignee: (unassigned) => Eric Desrochers (slashd)
** Changed in: ntp (Ubuntu Trusty)
Assignee: (unassigned) => Eric Desrochers (slashd)
** Changed in: ntp (Ubuntu Wily)
Assignee: (unassigned) => Eric Desrochers (slashd)
** Changed i
** Changed in: ntp (Ubuntu Xenial)
Status: New => In Progress
** Changed in: ntp (Ubuntu Wily)
Status: New => In Progress
** Changed in: ntp (Ubuntu Precise)
Status: New => In Progress
** Changed in: ntp (Ubuntu Trusty)
Status: New => In Progress
--
You received thi
I have build a test package for the community to validate it solve the bug
before starting the SRU process [1].
The goal of this testfix is only to confirm that this solve the bug and it is
not a final solution.
Here's what has been brought to my attention about the test package I
have provided.
** Description changed:
+ [Impact]
+
+ If an NTP client sends a request with a source port less than 123, the packet
is silently ignored by ntpd.
+ This is occurring in our environment due to NAT.
+
+ [Test Case]
+
+ The problem can easily be reproduced by having an iptable postrouting
+ nat
** Tags added: sts
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to ntp in Ubuntu.
https://bugs.launchpad.net/bugs/1479652
Title:
[patch] ntpd rejects source UDP ports less than 123 as bogus
To manage notifications about this bug go
Patch
--
Distribution : Trusty (14.04)
Package version : ntp_4.2.6.p5+dfsg-3ubuntu2.14.04.8
--
Note: kick-d is currently working on a merge for Xenial, including this patch.
I'm including the .debdiffs for the other distributions (W/T/P) for once the
merge for Xenial will be completed.
** Patch
Patch
--
Distribution : Wily (15.10)
Package version : 4.2.6.p5+dfsg-3ubuntu8.2
--
** Patch added: "wily_4.2.6.p5+dfsg-3ubuntu8.2"
https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1479652/+attachment/4556354/+files/lp1479652_wily_8.2.debdiff
--
You received this bug notification because yo
Patch
--
Distribution : Precise (12.04)
Package version : 4.2.6.p3+dfsg-1ubuntu3.9
--
** Patch added: "precise_ntp_4.2.6.p3+dfsg-1ubuntu3.9"
https://bugs.launchpad.net/ubuntu/precise/+source/ntp/+bug/1479652/+attachment/4556380/+files/lp1479652_precise_3.9.debdiff
--
You received this bug n
** Description changed:
[Impact]
If an NTP client sends a request with a source port less than 123, the
packet is silently ignored by ntpd. This is occurring in our environment
due to NAT.
[Test Case]
The problem can easily be reproduced by having an iptable postrouting
nat
** Description changed:
[Impact]
If an NTP client sends a request with a source port less than 123, the
packet is silently ignored by ntpd. This is occurring in our environment
due to NAT.
[Test Case]
The problem can easily be reproduced by having an iptable postrouting
nat
It has been brought to my attention ...
--
I confirm that the proposed testfix package resolved the issue on Trusty.
The test were made on test machines where the client had an iptable postrouting
nat forcing the source port to be under 123.
- ntpdate command performed on the client machine was
** Tags removed: verification-done
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to ntp in Ubuntu.
https://bugs.launchpad.net/bugs/1479652
Title:
[patch] ntpd rejects source UDP ports less than
I confirmed the package"4.2.6.p3+dfsg-1ubuntu3.9" solved the problem in
Ubuntu Precise
NTP Version : 1:4.2.6.p3+dfsg-1ubuntu3.1
With no IPTABLES rule ==> Working
$ ntpdate x.x.x.x
11 Feb 16:15:19 ntpdate[1243]: adjust time server x.x.x.x offset 0.190571 sec
With IPTABLES rule ==> Not working
$ i
I confirmed the package "4.2.6.p5+dfsg-3ubuntu8.2" solve the bug in
Ubuntu Wily
# With port <123 using ntpdate (without patch)
11 Feb 20:30:09 ntpdate[2348]: no server suitable for synchronization found
# With port <123 using ntpdate (including patch)
11 Feb 20:32:18 ntpdate[3243]: adjust time se
Public bug reported:
It has been brought to my attention by the community that package
"openipmi" is build without openssl.
Taken from "openipmi-2.0.18" source code:
--
filename:debian/rules
---
23 config.status: configure
24 dh_testdir
25 dh_autotools-dev_updateconfig
26 # Add here commands to c
** Tags added: sts
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openipmi in Ubuntu.
https://bugs.launchpad.net/bugs/1546735
Title:
openipmi package compile without SSL
To manage notifications about this bug go to:
https://bugs.la
Following a discussion with the Debian distribution maintenance software "Noël
Köthe ".
SSL support has been enabled by debian upstream maintainer and has now landed
in unstable in openipmi-2.0.21.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is su
Debian package for unstable
# filename: openipmi-2.0.21/debian/changelog
openipmi (2.0.21-1) unstable; urgency=medium
...
* enabled openssl. closes: #775847
...
-- Noël Köthe Thu, 25 Feb 2016 12:06:21 +0100
--
You received this bug notification because you are a member of Ubuntu
Server Te
** Changed in: openipmi (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openipmi in Ubuntu.
https://bugs.launchpad.net/bugs/1546735
Title:
openipmi package compile without SSL
To manage notif
** Changed in: openipmi (Ubuntu)
Assignee: (unassigned) => Eric Desrochers (slashd)
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openipmi in Ubuntu.
https://bugs.launchpad.net/bugs/1546735
Title:
openipmi package comp
Upstream bug for OpenStack Compute (nova):
https://bugs.launchpad.net/nova/+bug/1554227
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1554540
Title:
DHCP unicast requests are not resp
Public bug reported:
Issue:
We run nova-network in VLAN+multi_host mode on Kilo and notice that only one
dnsmasq process (either the oldest or newest) on the hypervisor responds to
unicast BOOTPREQUESTS. dhclient on VMs will retry until it eventually gives up
and broadcasts the request, which i
** Changed in: nova
Status: New => Confirmed
** Changed in: nova (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1554227
Title:
DHCP uni
62 matches
Mail list logo