package zentyal-core 2.3.21+quantal1 failed to install/upgrade: sub-processo script post-installation instalado retornou estado de saída de erro 2

Bug #1049077 reported by Marcelo e Salua
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
zentyal-core (Ubuntu)
New
Undecided
Unassigned

Bug Description

problms

ProblemType: Package
DistroRelease: Ubuntu 12.10
Package: zentyal-core 2.3.21+quantal1
ProcVersionSignature: Ubuntu 3.5.0-10.10-generic 3.5.1
Uname: Linux 3.5.0-10-generic i686
ApportVersion: 2.5.1-0ubuntu7
Architecture: i386
Date: Tue Sep 11 09:14:14 2012
ErrorMessage: sub-processo script post-installation instalado retornou estado de saída de erro 2
InstallationMedia: Ubuntu 12.10 "Quantal Quetzal" - Alpha i386 (20120730.1)
PackageArchitecture: all
SourcePackage: zentyal-core
Title: package zentyal-core 2.3.21+quantal1 failed to install/upgrade: sub-processo script post-installation instalado retornou estado de saída de erro 2
UpgradeStatus: No upgrade log present (probably fresh install)
modified.conffile..etc.zentyal.core.conf: [deleted]
modified.conffile..etc.zentyal.events.conf: [deleted]
modified.conffile..etc.zentyal.hooks.template.postservice: [deleted]
modified.conffile..etc.zentyal.hooks.template.postsetconf: [deleted]
modified.conffile..etc.zentyal.hooks.template.preservice: [deleted]
modified.conffile..etc.zentyal.hooks.template.presetconf: [deleted]
modified.conffile..etc.zentyal.logs.conf: [deleted]
modified.conffile..etc.zentyal.post.save.README: [deleted]
modified.conffile..etc.zentyal.pre.save.README: [deleted]

Revision history for this message
Marcelo e Salua (marceloesalua) wrote :
Revision history for this message
Marc Deslauriers (mdeslaur) wrote : Bug is not a security issue

Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find.

security vulnerability: yes → no
visibility: private → public
Revision history for this message
Marcos Agüero (wiredrat) wrote :

Same problem here but in Trusty:

However, I found a problem with redis configuration shipped with Zentyal. While trying to lauch the redis-server instance for ebox (/etc/init/ebox.redis.conf):

# sudo -u ebox /usr/bin/redis-server /var/lib/zentyal/conf/redis.conf

*** FATAL CONFIG FILE ERROR ***
Reading the configuration file, at line 307
>>> 'vm-enabled no'
Bad directive or wrong number of arguments

It seems to be a wrong version of redis that lacks some configuration directives shipped with Zentyal. Commenting out the following on /usr/share/zentyal/stubs/core/redis.conf.mas

vm-enabled no
vm-swap-file /var/lib/redis/redis.swap
vm-max-memory 0
vm-page-size 32
hash-max-zipmap-entries 512
hash-max-zipmap-value 64

You can do an apt-get install -f and end installation (however some other errors appears)

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.