[Group.of.nepali.translators] [Bug 1557248] Re: OpenLDAP: Backport a fix for use-after-free in GnuTLS-related code
** Changed in: openldap (Debian) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1557248 Title: OpenLDAP: Backport a fix for use-after-free in GnuTLS-related code Status in openldap package in Ubuntu: Fix Released Status in openldap source package in Wily: Fix Released Status in openldap source package in Xenial: Fix Released Status in openldap source package in Yakkety: Fix Released Status in openldap package in Debian: Fix Released Bug description: May I ask that you backport an upstream patch that resolves the issue of use-after-free in libldap that interferes with syncrepl, causing failures and segfaults. OpenLDAP commit: 283f3ae1713df449cc170965b311b19157f7b7ea Link: http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commitdiff;h=283f3ae1713df449cc170965b311b19157f7b7ea Modifications to file: libraries/libldap/tls_g.c This problem affects openldap 2.4.41 (in Ubuntu wily), 2.4.42 (in Ubuntu xenial), as well as in 2.4.44 (current upstream stable version). More details are availble on OpenLDAP project bug tracker at: http://www.openldap.org/its/index.cgi/Software%20Bugs?id=8385 Thank you To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/1557248/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1689687] Re: pass validation if shim protocol is not installed
This bug was fixed in the package grub2 - 2.02~beta2-36ubuntu3.12 --- grub2 (2.02~beta2-36ubuntu3.12) xenial; urgency=medium * debian/patches: Rework linuxefi/SecureBoot support and sync with upstream SB patch set: (LP: #1696599) - linuxefi_backport_arm64.patch: backport basic arm64 chainload/linux command support from 17.04. - linuxefi_arm_sb_support.patch: add Secure Boot support for arm for its chainloader. - linuxefi_fix_validation_race.patch: Fix a race in validating images. - linuxefi_chainloader_path.patch: honor the starting path for grub, so images do not need to be started from $root. - linuxefi_chainloader_sb.patch: Fix some more issues in chainloader use when Secure Boot is enabled. - linuxefi_loaders_enforce_sb.patch: Enforce Secure Boot policy for all loaders: don't load the commands when Secure Boot is enabled. - linuxefi_re-enable_linux_cmd.patch: Since we rely on the linux and initrd commands to automatically hand-off to linuxefi/initrdefi; re- enable the linux loader. - linuxefi_chainloader_pe_fixes.patch: PE parsing fixes for chainloading "special" PE images, such as Windows'. - linuxefi_rework_non-sb_cases.patch: rework cases where Secure Boot is disabled or shim validation is disabled so loading works as EFI binaries when it is supposed to. - Removed linuxefi_require_shim.patch; superseded by the above. (LP: #1689687) * debian/patches/git_tsc_use_alt_delay_sources_d43a5ee6.patch: refreshed. * debian/patches/arm64-set-correct-length-of-device-path-end-entry.patch: dropped; included in linuxefi_backport_arm64.patch. -- Mathieu Trudel-LapierreThu, 08 Jun 2017 10:16:17 -0700 ** Changed in: grub2 (Ubuntu Xenial) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1689687 Title: pass validation if shim protocol is not installed Status in grub2 package in Ubuntu: Fix Released Status in grub2 source package in Xenial: Fix Released Status in grub2 source package in Yakkety: Won't Fix Status in grub2 source package in Zesty: Fix Released Status in grub2 source package in Artful: Fix Released Bug description: [Impact] Users of UEFI Secure Boot that must disable SB validation in shim, for example to run dkms modules, may notice that the kernel incorrectly reports the SecureBoot/shim states. [Test case] 1) Install bbswitch-dkms a) Validate whether you are prompted to disable Secure Boot. If Secure Boot is already disabled, you should not be prompted again. If it isn't, you should be prompted once. b) If shim validation was previously disabled, verify that the kernel reports /proc/sys/kernel/moksbstate_disabled as "1" (shim validation disabled) [Regression Potential] This affects the loading behavior for the kernel, which will now load as an EFI binary and thus execute some extra code to bring up UEFI, which would otherwise not get loaded in the case shim validation is disabled. Given that the system must have booted successfully once for validation to get disabled, there should not be any issues; but possible resulting regressions would be a failure to correctly load the kernel, or a kernel issue early on during boot. Furthermore, any instance where the incorrect loading behavior was relied upon by installs (though I can think of no examples for this) would regress. The kind of issue that might be seen there is where code relies on /proc/sys/kernel/moksbstate_disabled or /proc/sys/kernel/secure_boot, or on other aspects of the kernel's secure boot policy (there seems to exist at least one special case for SB in kernel bluetooth code), the programs that rely on such behavior would regress. There are no packages shipped in Ubuntu that rely on this incorrect behavior; the only known package to ship something that checks the relevant /proc files is shim-signed, and this is meant to correct the behavior when these values are set. --- GRUB currently fails SecureBoot validation (ie. calls to grub_linuxefi_secure_validate() fail) if shim's protocol is not installed when that function is called. This currently breaks some kernel features relying on starting in the EFI stub code (ie. the kernel being loaded as an EFI binary); and instead falls back to the 'linux' command instead of 'linuxefi'. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1689687/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help :
[Group.of.nepali.translators] [Bug 1696599] Re: backport/sync UEFI, Secure Boot support
This bug was fixed in the package grub2 - 2.02~beta2-36ubuntu3.12 --- grub2 (2.02~beta2-36ubuntu3.12) xenial; urgency=medium * debian/patches: Rework linuxefi/SecureBoot support and sync with upstream SB patch set: (LP: #1696599) - linuxefi_backport_arm64.patch: backport basic arm64 chainload/linux command support from 17.04. - linuxefi_arm_sb_support.patch: add Secure Boot support for arm for its chainloader. - linuxefi_fix_validation_race.patch: Fix a race in validating images. - linuxefi_chainloader_path.patch: honor the starting path for grub, so images do not need to be started from $root. - linuxefi_chainloader_sb.patch: Fix some more issues in chainloader use when Secure Boot is enabled. - linuxefi_loaders_enforce_sb.patch: Enforce Secure Boot policy for all loaders: don't load the commands when Secure Boot is enabled. - linuxefi_re-enable_linux_cmd.patch: Since we rely on the linux and initrd commands to automatically hand-off to linuxefi/initrdefi; re- enable the linux loader. - linuxefi_chainloader_pe_fixes.patch: PE parsing fixes for chainloading "special" PE images, such as Windows'. - linuxefi_rework_non-sb_cases.patch: rework cases where Secure Boot is disabled or shim validation is disabled so loading works as EFI binaries when it is supposed to. - Removed linuxefi_require_shim.patch; superseded by the above. (LP: #1689687) * debian/patches/git_tsc_use_alt_delay_sources_d43a5ee6.patch: refreshed. * debian/patches/arm64-set-correct-length-of-device-path-end-entry.patch: dropped; included in linuxefi_backport_arm64.patch. -- Mathieu Trudel-LapierreThu, 08 Jun 2017 10:16:17 -0700 ** Changed in: grub2 (Ubuntu Xenial) Status: Fix Committed => Fix Released ** Changed in: grub2-signed (Ubuntu Xenial) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1696599 Title: backport/sync UEFI, Secure Boot support Status in grub2 package in Ubuntu: Fix Released Status in grub2-signed package in Ubuntu: Fix Released Status in grub2 source package in Trusty: New Status in grub2-signed source package in Trusty: New Status in grub2 source package in Xenial: Fix Released Status in grub2-signed source package in Xenial: Fix Released Status in grub2 source package in Yakkety: Won't Fix Status in grub2-signed source package in Yakkety: Won't Fix Status in grub2 source package in Zesty: Fix Released Status in grub2-signed source package in Zesty: Fix Released Status in grub2 source package in Artful: Fix Released Status in grub2-signed source package in Artful: Fix Released Bug description: [Impact] Since the implementation of UEFI Secure Boot in Ubuntu, there has been a large number of changes to the EFI patchset, handled "upstream" at https://github.com/vathpela/grub2-fedora/tree/sb. This SRU is handled as a wholesale "sync" with a known set of patches rather than individual cherry-picks given the high risk in cherry- picking individual changes; we do not want to risk subtly breaking Secure Boot support or introducing a security issue due to using different sets of patches across our currently supported releases. Using a common set of patches across releases and making sure we're in sync with "upstream" for that particular section of the grub2 codebase (specifically, UEFI/SB support is typically outside the GNU GRUB tree) allows us to make sure UEFI Secure Boot remains supportable and that potential security issues are easy to fix quickly given the complexity of the codebase. This is a complex set of enablement patches; most of them will be fairly straightforward backports, but there are a few known warts: * The included patches are based on grub2 2.02~beta3; as such, some patches require extra backporting effort of other pieces of the loader code down to releases that do not yet include 2.02~beta3 code. [Test Case] The desktop, server, and alternate install images should all boot and install on an SB-enabled system. I would recommend testing installations from both a CD and a USB stick. After each installation, validate that Secure Boot is enabled by checking /sys/firmware/efi/efivars/SecureBoot-*, as well as /sys/firmware/efi/efivars/Mok* variables (for the cases where shim validation may be disabled). Tests should include: - booting with Secure Boot enabled - booting with Secure Boot enabled, but shim validation disabled - booting with Secure Boot disabled, but still in EFI mode [Regression Potential] Check that non-SB installations of all these images still work. For this, it is sufficient to test with either a CD or a USB stick, but not necessarily both.
[Group.of.nepali.translators] [Bug 1551747] Re: ubuntu-fan causes issues during network configuration
** Changed in: cloud-init Status: New => Invalid -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1551747 Title: ubuntu-fan causes issues during network configuration Status in cloud-init: Invalid Status in Snappy: Confirmed Status in ubuntu-fan package in Ubuntu: Fix Released Status in ubuntu-fan source package in Xenial: Fix Released Status in ubuntu-fan source package in Yakkety: Fix Released Bug description: it seems that ubuntu-fan is causing issues with network configuration. On 16.04 daily image: root@localhost:~# snappy list NameDate Version Developer canonical-pi2 2016-02-02 3.0 canonical canonical-pi2-linux 2016-02-03 4.3.0-1006-3 canonical ubuntu-core 2016-02-22 16.04.0-10.armhf canonical I see this when I'm activating a wifi card on a raspberry pi 2. root@localhost:~# ifdown wlan0 ifdown: interface wlan0 not configured root@localhost:~# ifup wlan0 Internet Systems Consortium DHCP Client 4.3.3 Copyright 2004-2015 Internet Systems Consortium. All rights reserved. For info, please visit https://www.isc.org/software/dhcp/ Listening on LPF/wlan0/c4:e9:84:17:31:9b Sending on LPF/wlan0/c4:e9:84:17:31:9b Sending on Socket/fallback DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 3 (xid=0x81c0c95e) DHCPDISCOVER on wlan0 to 255.255.255.255 port 67 interval 5 (xid=0x81c0c95e) DHCPREQUEST of 192.168.0.170 on wlan0 to 255.255.255.255 port 67 (xid=0x5ec9c081) DHCPOFFER of 192.168.0.170 from 192.168.0.251 DHCPACK of 192.168.0.170 from 192.168.0.251 RTNETLINK answers: File exists bound to 192.168.0.170 -- renewal in 17145 seconds. run-parts: /etc/network/if-up.d/ubuntu-fan exited with return code 1 Failed to bring up wlan0. === [Impact] Installing ubuntu-fan can trigger error messages when initialising with no fan configuration. [Test Case] As above. [Regression Potential] Low, suppresses errorneous error messages. To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-init/+bug/1551747/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1704962] Re: linux-hwe: 4.10.0-29.33~16.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-proposed Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/regression-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/security-signoff Status: New => Fix Released ** Changed in: kernel-sru-workflow/verification-testing Status: New => Confirmed ** Description changed: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1704961 phase: Uploaded + kernel-stable-phase-changed:Friday, 28. July 2017 16:08 UTC + kernel-stable-phase:Promoted to proposed ** Description changed: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1704961 - phase: Uploaded - kernel-stable-phase-changed:Friday, 28. July 2017 16:08 UTC - kernel-stable-phase:Promoted to proposed + phase: Promoted to proposed + proposed-announcement-sent: true + proposed-testing-requested: true -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1704962 Title: linux-hwe: 4.10.0-29.33~16.04.1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Incomplete Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: New Status in Kernel SRU Workflow verification-testing series: Confirmed Status in linux-hwe package in Ubuntu: Invalid Status in linux-hwe source package in Xenial: Confirmed Bug description: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1704961 phase: Promoted to proposed proposed-announcement-sent: true proposed-testing-requested: true To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1704962/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1707233] [NEW] Xenial update to 4.4.79 stable release
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The 4.4.79 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the 4.4.79 stable release shall be applied: * disable new gcc-7.1.1 warnings for now * ir-core: fix gcc-7 warning on bool arithmetic * s5p-jpeg: don't return a random width/height * thermal: cpu_cooling: Avoid accessing potentially freed structures * ath9k: fix tx99 use after free * ath9k: fix tx99 bus error * NFC: fix broken device allocation * NFC: nfcmrvl_uart: add missing tty-device sanity check * NFC: nfcmrvl: do not use device-managed resources * NFC: nfcmrvl: use nfc-device for firmware download * NFC: nfcmrvl: fix firmware-management initialisation * nfc: Ensure presence of required attributes in the activate_target handler * nfc: Fix the sockaddr length sanitization in llcp_sock_connect * NFC: Add sockaddr length checks before accessing sa_family in bind handlers * perf intel-pt: Move decoder error setting into one condition * perf intel-pt: Improve sample timestamp * perf intel-pt: Fix missing stack clear * perf intel-pt: Ensure IP is zero when state is INTEL_PT_STATE_NO_IP * perf intel-pt: Clear FUP flag on error * Bluetooth: use constant time memory comparison for secret values * wlcore: fix 64K page support * ASoC: compress: Derive substream from stream based on direction * PM / Domains: Fix unsafe iteration over modified list of device links * PM / Domains: Fix unsafe iteration over modified list of domain providers * scsi: ses: do not add a device to an enclosure if enclosure_add_links() fails. * iscsi-target: Add login_keys_workaround attribute for non RFC initiators * powerpc/64: Fix atomic64_inc_not_zero() to return an int * powerpc: Fix emulation of mcrf in emulate_step() * powerpc: Fix emulation of mfocrf in emulate_step() * powerpc/asm: Mark cr0 as clobbered in mftb() * af_key: Fix sadb_x_ipsecrequest parsing * PCI/PM: Restore the status of PCI devices across hibernation * ipvs: SNAT packet replies only for NATed connections * xhci: fix 2ms port resume timeout * xhci: Fix NULL pointer dereference when cleaning up streams for removed host * usb: storage: return on error to avoid a null pointer dereference * USB: cdc-acm: add device-id for quirky printer * usb: renesas_usbhs: fix usbhsc_resume() for !USBHSF_RUNTIME_PWCTRL * usb: renesas_usbhs: gadget: disable all eps when the driver stops * md: don't use flush_signals in userspace processes * x86/xen: allow userspace access during hypercalls * cx88: Fix regression in initial video standard setting * Raid5 should update rdev->sectors after reshape * s390/syscalls: Fix out of bounds arguments access * drm/amd/amdgpu: Return error if initiating read out of range on vram * drm/radeon/ci: disable mclk switching for high refresh rates (v2) * drm/radeon: Fix eDP for single-display iMac10,1 (v2) * ipmi: use rcu lock around call to intf->handlers->sender() * ipmi:ssif: Add missing unlock in error branch * f2fs: Don't clear SGID when inheriting ACLs * vfio: Fix group release deadlock * vfio: New external user group/file match * ftrace: Fix uninitialized variable in match_records() * MIPS: Fix mips_atomic_set() retry condition * MIPS: Fix mips_atomic_set() with EVA * MIPS: Negate error syscall return in trace * x86/acpi: Prevent out of bound access caused by broken ACPI tables * x86/ioapic: Pass the correct data to unmask_ioapic_irq() * MIPS: Fix MIPS I ISA /proc/cpuinfo reporting * MIPS: Save static registers before sysmips * MIPS: Actually decode JALX in `__compute_return_epc_for_insn' * MIPS: Fix unaligned PC interpretation in `compute_return_epc' * MIPS: math-emu: Prevent wrong ISA mode instruction emulation * MIPS: Send SIGILL for BPOSGE32 in `__compute_return_epc_for_insn' * MIPS: Rename `sigill_r6' to `sigill_r2r6' in `__compute_return_epc_for_insn' * MIPS: Send SIGILL for linked branches in `__compute_return_epc_for_insn' * MIPS: Fix a typo: s/preset/present/ in r2-to-r6 emulation error message * Input: i8042 - fix crash at boot time * NFS: only invalidate dentrys that are clearly invalid. * udf: Fix deadlock between writeback and udf_setsize() * target: Fix COMPARE_AND_WRITE caw_sem leak during se_cmd quiesce * perf annotate: Fix broken arrow at row 0 connecting jmp instruction to its target * Revert "perf/core: Drop kernel samples even though :u is specified" * staging: rtl8188eu: add TL-WN722N v2 support * ceph: fix race in concurrent readdir * RDMA/core: Initialize port_num in qp_attr * drm/mst: Fix error handling during MST sideband message reception *
[Group.of.nepali.translators] [Bug 1686183] Re: Ship ubuntu-advantage in ubuntu-minimal
This bug was fixed in the package ubuntu-advantage-tools - 2 --- ubuntu-advantage-tools (2) trusty; urgency=medium * ubuntu-advantage & /etc/update-motd.d/99-esm now build, run and are quiet on non-precise release. (LP: #1686183) * Add simple dep8 tests. * Also install ca-certificates (LP: #1690270) -- David BrittonFri, 30 Jun 2017 15:20:00 -0600 ** Changed in: ubuntu-advantage-tools (Ubuntu Artful) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1686183 Title: Ship ubuntu-advantage in ubuntu-minimal Status in ubuntu-advantage-tools package in Ubuntu: Fix Released Status in ubuntu-meta package in Ubuntu: New Status in ubuntu-advantage-tools source package in Precise: Fix Released Status in ubuntu-meta source package in Precise: Fix Released Status in ubuntu-advantage-tools source package in Trusty: Fix Committed Status in ubuntu-meta source package in Trusty: New Status in ubuntu-advantage-tools source package in Xenial: Fix Committed Status in ubuntu-meta source package in Xenial: New Status in ubuntu-advantage-tools source package in Yakkety: Won't Fix Status in ubuntu-meta source package in Yakkety: Won't Fix Status in ubuntu-advantage-tools source package in Zesty: Fix Committed Status in ubuntu-meta source package in Zesty: New Status in ubuntu-advantage-tools source package in Artful: Fix Released Status in ubuntu-meta source package in Artful: New Bug description: The ubuntu-advantage-tools package is a bit odd as it was first landed in precise to support the ESM effort inside canonical. [0] In order to bring this package up to date across other series in ubuntu, it has been recommended by the Ubuntu Foundations team to land into trusty next, then forward-port pocket-copy to all supported series until we get to the devel release. The version here: https://github.com/CanonicalLtd/ubuntu-advantage- script/releases/tag/v2 ... has all on-disk bits correctly working, for all series, but no-ops on any release other than precise (ESM is only for "unsupported" LTS releases as it were). This is a request to land ubuntu-advantage- tools into trusty, then pocket-copy it to supported series of ubuntu once that is finished. [Impact] * Allow ubuntu-advantage users to access the extended security maintenance script with a simple command line tool. This script needs to hit precise machines and be easy for ubuntu-advantage customers to enable, thus basefiles was chosen as a home. [Test Case] * Run ubuntu-advantage, it should print out help * Run sudo ubuntu-advantage enable (without sudo it will warn you), but you need to be an ubuntu-advantage customer to get that token. In the end, the script simply adds and removes an /etc/apt/sources.list.d entry. * you can contact me (d...@canonical.com) if you would like a token for test purposes. [Regression Potential] * Low, this is a new script, not included in any automated startup paths. [Other Info] * http://blog.dustinkirkland.com/2017/03/ubuntu-1204-esm.html [0] https://insights.ubuntu.com/2017/03/14/introducing-ubuntu-12-04 -esm-extended-security-maintenance/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1686183/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1686183] Re: Ship ubuntu-advantage in ubuntu-minimal
** Changed in: ubuntu-advantage-tools (Ubuntu Yakkety) Status: New => Won't Fix ** Changed in: ubuntu-meta (Ubuntu Yakkety) Status: New => Won't Fix -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1686183 Title: Ship ubuntu-advantage in ubuntu-minimal Status in ubuntu-advantage-tools package in Ubuntu: New Status in ubuntu-meta package in Ubuntu: New Status in ubuntu-advantage-tools source package in Precise: Fix Released Status in ubuntu-meta source package in Precise: Fix Released Status in ubuntu-advantage-tools source package in Trusty: Fix Committed Status in ubuntu-meta source package in Trusty: New Status in ubuntu-advantage-tools source package in Xenial: New Status in ubuntu-meta source package in Xenial: New Status in ubuntu-advantage-tools source package in Yakkety: Won't Fix Status in ubuntu-meta source package in Yakkety: Won't Fix Status in ubuntu-advantage-tools source package in Zesty: New Status in ubuntu-meta source package in Zesty: New Status in ubuntu-advantage-tools source package in Artful: New Status in ubuntu-meta source package in Artful: New Bug description: The ubuntu-advantage-tools package is a bit odd as it was first landed in precise to support the ESM effort inside canonical. [0] In order to bring this package up to date across other series in ubuntu, it has been recommended by the Ubuntu Foundations team to land into trusty next, then forward-port pocket-copy to all supported series until we get to the devel release. The version here: https://github.com/CanonicalLtd/ubuntu-advantage- script/releases/tag/v2 ... has all on-disk bits correctly working, for all series, but no-ops on any release other than precise (ESM is only for "unsupported" LTS releases as it were). This is a request to land ubuntu-advantage- tools into trusty, then pocket-copy it to supported series of ubuntu once that is finished. [Impact] * Allow ubuntu-advantage users to access the extended security maintenance script with a simple command line tool. This script needs to hit precise machines and be easy for ubuntu-advantage customers to enable, thus basefiles was chosen as a home. [Test Case] * Run ubuntu-advantage, it should print out help * Run sudo ubuntu-advantage enable (without sudo it will warn you), but you need to be an ubuntu-advantage customer to get that token. In the end, the script simply adds and removes an /etc/apt/sources.list.d entry. * you can contact me (d...@canonical.com) if you would like a token for test purposes. [Regression Potential] * Low, this is a new script, not included in any automated startup paths. [Other Info] * http://blog.dustinkirkland.com/2017/03/ubuntu-1204-esm.html [0] https://insights.ubuntu.com/2017/03/14/introducing-ubuntu-12-04 -esm-extended-security-maintenance/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1686183/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1707147] Re: apktool crashes while decoding an apk and prints system info
Assuming that artful is fixed, seems that the dependency chain increased too much in terms of java dependencies, so this is not really feasible for an SRU ** Changed in: apktool (Ubuntu Xenial) Status: Incomplete => Invalid ** Changed in: apktool (Ubuntu Zesty) Status: Incomplete => Invalid -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1707147 Title: apktool crashes while decoding an apk and prints system info Status in apktool package in Ubuntu: Fix Released Status in apktool source package in Xenial: Invalid Status in apktool source package in Zesty: Invalid Bug description: On Ubuntu Xenial we get this output: backbox@backbox:~/Downloads$ apktool d Messenger_v128.0.0.21.88_apkpure.com.apk 10:32:12 up 32 min, 2 users, load average: 0,14, 0,23, 0,22 USER TTY FROM LOGIN@ IDLE JCPU PCPU WHAT backbox tty7 :0 10:00 32:19 33.72s 0.01s /bin/sh /etc/xdg/xfce4/xinitrc -- /etc/X11/xinit/xserverrc backbox pts/3:0.0 10:204.00s 0.06s 0.00s w I: Using Apktool 2.0.2-dirty on Messenger_v128.0.0.21.88_apkpure.com.apk I: Loading resource table... I: Decoding AndroidManifest.xml with resources... I: Loading resource table from file: /home/backbox/apktool/framework/1.apk W: Could not decode attr value, using undecoded value instead: ns=android, name=versionCode, value=0x03ef8a2a I: Loading resource table from file: /home/backbox/apktool/framework/1.apk W: Could not decode attr value, using undecoded value instead: ns=android, name=versionName, value=0x003a I: Loading resource table from file: /home/backbox/apktool/framework/1.apk W: Could not decode attr value, using undecoded value instead: ns=android, name=versionCode, value=0x03ef8a2a I: Loading resource table from file: /home/backbox/apktool/framework/1.apk W: Could not decode attr value, using undecoded value instead: ns=android, name=versionName, value=0x003a Exception in thread "main" java.lang.NullPointerException at java.io.Writer.write(Writer.java:157) at brut.androlib.res.util.ExtMXSerializer.writeAttributeValue(ExtMXSerializer.java:38) at org.xmlpull.mxp1_serializer.MXSerializer.attribute(MXSerializer.java:696) at org.xmlpull.v1.wrapper.classic.XmlSerializerDelegate.attribute(XmlSerializerDelegate.java:106) at org.xmlpull.v1.wrapper.classic.StaticXmlSerializerWrapper.writeStartTag(StaticXmlSerializerWrapper.java:267) at org.xmlpull.v1.wrapper.classic.StaticXmlSerializerWrapper.event(StaticXmlSerializerWrapper.java:211) at brut.androlib.res.decoder.XmlPullStreamDecoder$1.event(XmlPullStreamDecoder.java:83) at brut.androlib.res.decoder.XmlPullStreamDecoder.decode(XmlPullStreamDecoder.java:141) at brut.androlib.res.decoder.XmlPullStreamDecoder.decodeManifest(XmlPullStreamDecoder.java:153) at brut.androlib.res.decoder.ResFileDecoder.decodeManifest(ResFileDecoder.java:140) at brut.androlib.res.AndrolibResources.decodeManifestWithResources(AndrolibResources.java:199) at brut.androlib.Androlib.decodeManifestWithResources(Androlib.java:140) at brut.androlib.ApkDecoder.decode(ApkDecoder.java:100) at brut.apktool.Main.cmdDecode(Main.java:165) at brut.apktool.Main.main(Main.java:81) backbox@backbox:~/Downloads$ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apktool/+bug/1707147/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1707015] Re: image composite functions not working in php
Thanks for reporting this issue, I can reproduce it on Ubuntu 14.04 LTS and Ubuntu 16.04. I will investigate the regression and will publish an update to correct this shortly. ** Also affects: imagemagick (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: imagemagick (Ubuntu Trusty) Importance: Undecided Status: New ** Changed in: imagemagick (Ubuntu) Status: New => Invalid ** Changed in: imagemagick (Ubuntu Trusty) Status: New => Confirmed ** Changed in: imagemagick (Ubuntu Xenial) Status: New => In Progress ** Changed in: imagemagick (Ubuntu Trusty) Status: Confirmed => In Progress ** Changed in: imagemagick (Ubuntu Trusty) Assignee: (unassigned) => Marc Deslauriers (mdeslaur) ** Changed in: imagemagick (Ubuntu Xenial) Assignee: (unassigned) => Marc Deslauriers (mdeslaur) ** Changed in: imagemagick (Ubuntu Trusty) Importance: Undecided => High ** Changed in: imagemagick (Ubuntu Xenial) Importance: Undecided => High -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1707015 Title: image composite functions not working in php Status in imagemagick package in Ubuntu: Invalid Status in imagemagick source package in Trusty: In Progress Status in imagemagick source package in Xenial: In Progress Bug description: We use php-imagick to make image compositions on our servers. On July 25 we got an upgrade of imagemagick, from 6.8.9.9-7ubuntu5.7 to 8:6.8.9.9-7ubuntu5.8. After that upgrade our webservers, using the php imagick bindings, stopped making composites. The composite images just have the background layer showing, with no overlay layer composited on top. In PHP there are no errors or exceptions, and other imagick functions work fine. Reading images, scaling, making new images, rendering to bytes, all work fine. It is only the composite functions, in php bindings, that are not working. I downgraded our webservers to imagemagick 6.8.9.9-7ubuntu5, which is still available in the ubuntu archives, and the php composite functions started working again. 6.8.9.9-7ubuntu5.7 is no longer available in the archives (http://security.ubuntu.com/ubuntu/pool/main/i/imagemagick/). A test script to reproduce the bug is attached to this ticket. On version 6.8.9.9-7ubuntu5 this will show the ubuntu logo over a gray background. On the latest version, 6.8.9.9-7ubuntu5.8, this will show garbled fragments of the ubuntu logo over gray background, or perhaps just an empty gray background. This bug was identified on Ubuntu 16.04.2 LTS as a result of an automatic upgrade from ubuntu security. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1707015/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1707147] Re: apktool crashes while decoding an apk and prints system info
** Changed in: apktool (Ubuntu) Status: New => Fix Released ** Also affects: apktool (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: apktool (Ubuntu Zesty) Importance: Undecided Status: New ** Changed in: apktool (Ubuntu Xenial) Status: New => Incomplete ** Changed in: apktool (Ubuntu Zesty) Status: New => Incomplete -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1707147 Title: apktool crashes while decoding an apk and prints system info Status in apktool package in Ubuntu: Fix Released Status in apktool source package in Xenial: Incomplete Status in apktool source package in Zesty: Incomplete Bug description: On Ubuntu Xenial we get this output: backbox@backbox:~/Downloads$ apktool d Messenger_v128.0.0.21.88_apkpure.com.apk 10:32:12 up 32 min, 2 users, load average: 0,14, 0,23, 0,22 USER TTY FROM LOGIN@ IDLE JCPU PCPU WHAT backbox tty7 :0 10:00 32:19 33.72s 0.01s /bin/sh /etc/xdg/xfce4/xinitrc -- /etc/X11/xinit/xserverrc backbox pts/3:0.0 10:204.00s 0.06s 0.00s w I: Using Apktool 2.0.2-dirty on Messenger_v128.0.0.21.88_apkpure.com.apk I: Loading resource table... I: Decoding AndroidManifest.xml with resources... I: Loading resource table from file: /home/backbox/apktool/framework/1.apk W: Could not decode attr value, using undecoded value instead: ns=android, name=versionCode, value=0x03ef8a2a I: Loading resource table from file: /home/backbox/apktool/framework/1.apk W: Could not decode attr value, using undecoded value instead: ns=android, name=versionName, value=0x003a I: Loading resource table from file: /home/backbox/apktool/framework/1.apk W: Could not decode attr value, using undecoded value instead: ns=android, name=versionCode, value=0x03ef8a2a I: Loading resource table from file: /home/backbox/apktool/framework/1.apk W: Could not decode attr value, using undecoded value instead: ns=android, name=versionName, value=0x003a Exception in thread "main" java.lang.NullPointerException at java.io.Writer.write(Writer.java:157) at brut.androlib.res.util.ExtMXSerializer.writeAttributeValue(ExtMXSerializer.java:38) at org.xmlpull.mxp1_serializer.MXSerializer.attribute(MXSerializer.java:696) at org.xmlpull.v1.wrapper.classic.XmlSerializerDelegate.attribute(XmlSerializerDelegate.java:106) at org.xmlpull.v1.wrapper.classic.StaticXmlSerializerWrapper.writeStartTag(StaticXmlSerializerWrapper.java:267) at org.xmlpull.v1.wrapper.classic.StaticXmlSerializerWrapper.event(StaticXmlSerializerWrapper.java:211) at brut.androlib.res.decoder.XmlPullStreamDecoder$1.event(XmlPullStreamDecoder.java:83) at brut.androlib.res.decoder.XmlPullStreamDecoder.decode(XmlPullStreamDecoder.java:141) at brut.androlib.res.decoder.XmlPullStreamDecoder.decodeManifest(XmlPullStreamDecoder.java:153) at brut.androlib.res.decoder.ResFileDecoder.decodeManifest(ResFileDecoder.java:140) at brut.androlib.res.AndrolibResources.decodeManifestWithResources(AndrolibResources.java:199) at brut.androlib.Androlib.decodeManifestWithResources(Androlib.java:140) at brut.androlib.ApkDecoder.decode(ApkDecoder.java:100) at brut.apktool.Main.cmdDecode(Main.java:165) at brut.apktool.Main.main(Main.java:81) backbox@backbox:~/Downloads$ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apktool/+bug/1707147/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1706686] Re: sysdig 0.8.0-1ubuntu1 ADT test failure with linux-hwe 4.10.0-28.32~16.04.2
** Changed in: sysdig (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1706686 Title: sysdig 0.8.0-1ubuntu1 ADT test failure with linux-hwe 4.10.0-28.32~16.04.2 Status in sysdig package in Ubuntu: Invalid Status in sysdig source package in Xenial: In Progress Bug description: Testing failed on: armhf: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/armhf/s/sysdig/20170726_141908_17625@/log.gz To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/sysdig/+bug/1706686/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1706686] Re: sysdig 0.8.0-1ubuntu1 ADT test failure with linux-hwe 4.10.0-28.32~16.04.2
** Also affects: sysdig (Ubuntu Xenial) Importance: Undecided Status: New -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1706686 Title: sysdig 0.8.0-1ubuntu1 ADT test failure with linux-hwe 4.10.0-28.32~16.04.2 Status in sysdig package in Ubuntu: Invalid Status in sysdig source package in Xenial: In Progress Bug description: Testing failed on: armhf: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/armhf/s/sysdig/20170726_141908_17625@/log.gz To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/sysdig/+bug/1706686/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1693250] Re: raspi2 config diverges from master/generic armhf
This bug was fixed in the package linux-raspi2 - 4.10.0-1011.14 --- linux-raspi2 (4.10.0-1011.14) zesty; urgency=low * linux-raspi2: 4.10.0-1011.14 -proposed tracker (LP: #1701017) * arm64 kernel crashdump support (LP: #1694859) - [Config] CONFIG_CRASH_DUMP=y on arm64 * hisi_sas driver updates (LP: #1695999) - [Config] updateconfigs following rebase * raspi2 config diverges from master/generic armhf (LP: #1693250) - [Config] config sync wrt master - disable SND_ARMAACI, FTBFS - skip ABI and modules checks [ Ubuntu: 4.10.0-28.32 ] * linux: 4.10.0-28.32 -proposed tracker (LP: #1701013) * KILLER1435-S[0489:e0a2] BT cannot search BT 4.0 device (LP: #1699651) - Bluetooth: btusb: Add support for 0489:e0a2 QCA_ROME device * aacraid driver may return uninitialized stack data to userspace (LP: #1700077) - SAUCE: scsi: aacraid: Don't copy uninitialized stack memory to userspace * CVE-2017-9605 - drm/vmwgfx: Make sure backup_handle is always valid * CVE-2017-1000380 - ALSA: timer: Fix race between read and ioctl - ALSA: timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT * XDP eBPF programs fail to verify on Zesty ppc64el (LP: #1699627) - [Config] ppc64el: build for Power8 not Power7 * AACRAID for power9 platform (LP: #1689980) - scripts/spelling.txt: add "therfore" pattern and fix typo instances - scsi: aacraid: fix PCI error recovery path - scsi: aacraid: pci_alloc_consistent() failures on ARM64 - scsi: aacraid: Remove __GFP_DMA for raw srb memory - scsi: aacraid: Fix DMAR issues with iommu=pt - scsi: aacraid: Added 32 and 64 queue depth for arc natives - scsi: aacraid: Set correct Queue Depth for HBA1000 RAW disks - scsi: aacraid: Remove reset support from check_health - scsi: aacraid: Change wait time for fib completion - scsi: aacraid: Log count info of scsi cmds before reset - scsi: aacraid: Print ctrl status before eh reset - scsi: aacraid: Using single reset mask for IOP reset - scsi: aacraid: Rework IOP reset - scsi: aacraid: Add periodic checks to see IOP reset status - scsi: aacraid: Rework SOFT reset code - scsi: aacraid: Rework aac_src_restart - scsi: aacraid: Use correct function to get ctrl health - scsi: aacraid: Make sure ioctl returns on controller reset - scsi: aacraid: Enable ctrl reset for both hba and arc - scsi: aacraid: Add reset debugging statements - scsi: aacraid: Remove reference to Series-9 - scsi: aacraid: Update driver version to 50834 * arm64 kernel crashdump support (LP: #1694859) - memblock: add memblock_clear_nomap() - memblock: add memblock_cap_memory_range() - arm64: limit memory regions based on DT property, usable-memory-range - arm64: kdump: reserve memory for crash dump kernel - arm64: mm: add set_memory_valid() - arm64: mm: use phys_addr_t instead of unsigned long in __map_memblock - arm64: kdump: protect crash dump kernel memory - arm64: hibernate: preserve kdump image around hibernation - arm64: kdump: implement machine_crash_shutdown() - arm64: kdump: add VMCOREINFO's for user-space tools - [Config] CONFIG_CRASH_DUMP=y on arm64 - arm64: kdump: provide /proc/vmcore file - Documentation: kdump: describe arm64 port - Documentation: dt: chosen properties for arm64 kdump - efi/libstub/arm*: Set default address and size cells values for an empty dtb * hibmc driver does not include "pci:" prefix in bus ID (LP: #1698700) - SAUCE: drm: hibmc: Use set_busid function from drm core * Processes in "D" state due to zap_pid_ns_processes kernel call with Ubuntu + Docker (LP: #1698264) - pid_ns: Sleep in TASK_INTERRUPTIBLE in zap_pid_ns_processes * Bugfixes for hns network driver (LP: #1696031) - hns_enet: use cpumask_var_t for on-stack mask - net: hns: fix uninitialized data use - net: hns: avoid gcc-7.0.1 warning for uninitialized data - net: hns: Add ACPI support to check SFP present - net: hns: Fix the implementation of irq affinity function - net: hns: Modify GMAC init TX threshold value - net: hns: Optimize the code for GMAC pad and crc Config - net: hns: Remove redundant memset during buffer release - net: hns: bug fix of ethtool show the speed - net: hns: Optimize hns_nic_common_poll for better performance - net: hns: Fix to adjust buf_size of ring according to mtu - net: hns: Replace netif_tx_lock to ring spin lock - net: hns: Correct HNS RSS key set function - net: hns: Remove the redundant adding and deleting mac function - net: hns: Remove redundant mac_get_id() - net: hns: Remove redundant mac table operations - net: hns: Clean redundant code from hns_mdio.c file - net: hns: Optimise the code in hns_mdio_wait_ready() - net: hns: Simplify the exception sequence in hns_ppe_init() - net: hns: Adjust the SBM module buffer