[Group.of.nepali.translators] [Bug 1863337] Re: xenial/linux-oracle: 4.15.0-1034.37~16.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/automated-testing Status: Incomplete => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1863339 packages: main: linux-oracle meta: linux-meta-oracle signed: linux-signed-oracle phase: Testing phase-changed: Tuesday, 25. February 2020 10:16 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: - automated-testing: Stalled -- testing FAILED regression-testing: Ongoing -- testing in progress security-signoff: Stalled -- waiting for signoff verification-testing: Ongoing -- testing in progress variant: debs -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1863337 Title: xenial/linux-oracle: 4.15.0-1034.37~16.04.1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: In Progress Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-oracle package in Ubuntu: Invalid Status in linux-oracle source package in Xenial: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1863339 packages: main: linux-oracle meta: linux-meta-oracle signed: linux-signed-oracle phase: Testing phase-changed: Tuesday, 25. February 2020 10:16 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: regression-testing: Ongoing -- testing in progress security-signoff: Stalled -- waiting for signoff verification-testing: Ongoing -- testing in progress variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1863337/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1559576] Re: Ubuntu GNOME boots to black screen when using proprietary Nvidia drivers
** Bug watch added: bugzilla.gnome.org/ #750157 https://bugzilla.gnome.org/show_bug.cgi?id=750157 ** Project changed: gdm => gnome-shell -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1559576 Title: Ubuntu GNOME boots to black screen when using proprietary Nvidia drivers Status in GNOME Shell: Unknown Status in Ubuntu GNOME: Fix Released Status in gnome-shell package in Ubuntu: Fix Released Status in nvidia-graphics-drivers-375 package in Ubuntu: Fix Released Status in nvidia-graphics-drivers-375 source package in Xenial: Fix Released Status in nvidia-graphics-drivers-375 source package in Yakkety: Fix Released Status in nvidia-graphics-drivers-375 source package in Zesty: Fix Released Bug description: To fix this now without waiting for the Stable Release Update = Install xserver-xorg-legacy Impact == Many users are unable to use their computers after installing the NVIDIA proprietary drivers to Ubuntu GNOME. Specifically, the log in screen does not load. The problem is that many of nvidia-* driver packages do not depend on xserver-xorg-legacy which is needed for gdm/gnome-shell to work Test Case = 1. Check that gnome-shell depends on xserver-xorg-legacy. 2. Optionally, if you have an affected computer, set gdm as the default login manager (sudo apt install gdm3; sudo dpkg-reconfigure gdm3; sudo reboot). Does the login screen show up? And can you log in to gnome (sudo apt install gnome-shell)? Regression Potential Low. Installing a missing dependency should cause no issues; if it does, something is very broken already. Other Info == The most minimal fix here for 16.04 LTS and 16.10 is to just have gnome-shell depend on xserver-xorg-legacy. Updating all the nvidia-* packages in Ubuntu and the PPAs would be a lot more trouble; although that would still be a good idea so that this gnome-shell dependency could be dropped in future Ubuntu releases. xserver-xorg-legacy is a very small package. gdm3 depends on gnome-shell. Original Bug Report === Using latest Ubuntu Gnome x64 daily build with all updates installed. Lenovo Z70-80 laptop with Nvidia 840M, BIOS updated to latest version, secure boot and other potentially problematic BIOS settings disabled. Can only see a black screen instead of a log-in screen after boot completes when proprietary Nvidia drivers are installed. Regular Ubuntu works absolutely fine on the same machine with the same driver version. Attempting to use older drivers on Ubuntu Gnome made no difference. Bug is affecting more than just me. We were talking about workarounds in ubuntuforums. User fthx claims that switching to lightdm fixes the issue http://ubuntuforums.org/showthread.php?t=2317628&p=13457703#post13457703 ProblemType: Bug DistroRelease: Ubuntu 16.04 Package: linux-image-4.4.0-14-generic 4.4.0-14.30 ProcVersionSignature: Ubuntu 4.4.0-14.30-generic 4.4.5 Uname: Linux 4.4.0-14-generic x86_64 NonfreeKernelModules: nvidia_uvm nvidia_modeset nvidia ApportVersion: 2.20-0ubuntu3 Architecture: amd64 Date: Sat Mar 19 23:19:21 2016 HibernationDevice: RESUME=UUID=4f8fb76c-f99d-4c54-8a67-eed0653d8eb6 InstallationDate: Installed on 2016-03-19 (0 days ago) InstallationMedia: Ubuntu-GNOME 16.04 LTS "Xenial Xerus" - Alpha amd64 (20160318) MachineType: LENOVO 80FG ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.4.0-14-generic.efi.signed root=UUID=572a19f6-7324-4269-ad36-7ffc9919f7a2 ro noprompt persistent quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-4.4.0-14-generic N/A linux-backports-modules-4.4.0-14-generic N/A linux-firmware1.156 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 09/22/2015 dmi.bios.vendor: LENOVO dmi.bios.version: ABCN96WW dmi.board.asset.tag: NO Asset Tag dmi.board.name: Lenovo Z70-80 dmi.board.vendor: LENOVO dmi.board.version: NO DPK dmi.chassis.asset.tag: NO Asset Tag dmi.chassis.type: 10 dmi.chassis.vendor: LENOVO dmi.chassis.version: Lenovo Z70-80 dmi.modalias: dmi:bvnLENOVO:bvrABCN96WW:bd09/22/2015:svnLENOVO:pn80FG:pvrLenovoZ70-80:rvnLENOVO:rnLenovoZ70-80:rvrNODPK:cvnLENOVO:ct10:cvrLenovoZ70-80: dmi.product.name: 80FG dmi.product.version: Lenovo Z70-80 dmi.sys.vendor: LENOVO To manage notifications about this bug go to: https://bugs.launchpad.net/gnome-shell/+bug/1559576/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launch
[Group.of.nepali.translators] [Bug 1865106] Re: xenial/linux: 4.4.0-176.206 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package Status: In Progress => Fix Committed ** Changed in: kernel-sru-workflow/prepare-package-meta Status: In Progress => Fix Committed ** Changed in: kernel-sru-workflow/prepare-package-meta Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/prepare-package-signed Status: In Progress => Fix Committed ** Changed in: kernel-sru-workflow/prepare-package-signed Status: Fix Committed => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- packages: main: linux meta: linux-meta signed: linux-signed phase: Packaging phase-changed: Friday, 28. February 2020 04:40 UTC reason: - prepare-package: Pending -- package not yet uploaded - prepare-package-meta: Pending -- package not yet uploaded - prepare-package-signed: Pending -- package not yet uploaded + build-packages: Ongoing -- builds not complete in ppa main:building,meta:depwait,signed:depwait + prepare-package: Ongoing -- main package not yet fully built replaces: bug 1863338 trackers: xenial/linux/caracalla-kernel: bug 1865103 xenial/linux/pc-kernel: bug 1865104 xenial/linux/stlouis-kernel: bug 1865105 variant: debs -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1865106 Title: xenial/linux: 4.4.0-176.206 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: Fix Committed Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- packages: main: linux meta: linux-meta signed: linux-signed phase: Packaging phase-changed: Friday, 28. February 2020 04:40 UTC reason: build-packages: Ongoing -- builds not complete in ppa main:building,meta:depwait,signed:depwait prepare-package: Ongoing -- main package not yet fully built replaces: bug 1863338 trackers: xenial/linux/caracalla-kernel: bug 1865103 xenial/linux/pc-kernel: bug 1865104 xenial/linux/stlouis-kernel: bug 1865105 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1865106/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1865106] [NEW] linux: -proposed tracker
Public bug reported: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- replaces: bug 1863338 variant: debs ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Xenial) Importance: Medium Status: Confirmed ** Tags: kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-cycle-2020.02.17-3 xenial ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Tags added: kernel-release-tracking-bug xenial ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Xenial) Status: New => Confirmed ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-signed Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-signed Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/promote-to-proposed Importance: Undecided => Medium ** Changed in: kernel-sru-workf
[Group.of.nepali.translators] [Bug 1864733] Re: xenial/linux-aws-hwe: 4.15.0-1062.66~16.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/automated-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-proposed Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/regression-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/security-signoff Status: New => In Progress ** Changed in: kernel-sru-workflow/verification-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/automated-testing Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/regression-testing Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/verification-testing Status: Confirmed => In Progress ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1864734 packages: main: linux-aws-hwe meta: linux-meta-aws-hwe - phase: Promote to Proposed - phase-changed: Thursday, 27. February 2020 21:21 UTC + phase: Testing + phase-changed: Thursday, 27. February 2020 23:01 UTC + proposed-announcement-sent: true + proposed-testing-requested: true reason: - promote-to-proposed: Ongoing -- packages waiting in -proposed for mirror sync + automated-testing: Ongoing -- testing in progress + regression-testing: Ongoing -- testing in progress + security-signoff: Pending -- waiting for signoff + verification-testing: Ongoing -- testing in progress variant: debs -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1864733 Title: xenial/linux-aws-hwe: 4.15.0-1062.66~16.04.1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: In Progress Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-aws-hwe package in Ubuntu: Invalid Status in linux-aws-hwe source package in Xenial: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1864734 packages: main: linux-aws-hwe meta: linux-meta-aws-hwe phase: Testing phase-changed: Thursday, 27. February 2020 23:01 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: automated-testing: Ongoing -- testing in progress regression-testing: Ongoing -- testing in progress security-signoff: Pending -- waiting for signoff verification-testing: Ongoing -- testing in progress variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1864733/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1864745] Re: xenial/linux-azure: 4.15.0-1073.78 -proposed tracker
** Changed in: kernel-sru-workflow/automated-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-proposed Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/regression-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/security-signoff Status: New => Confirmed ** Changed in: kernel-sru-workflow/stakeholder-signoff Status: New => Confirmed ** Changed in: kernel-sru-workflow/verification-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/automated-testing Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/regression-testing Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/verification-testing Status: Confirmed => In Progress ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1864753 packages: main: linux-azure meta: linux-meta-azure signed: linux-signed-azure - phase: Promote to Proposed - phase-changed: Thursday, 27. February 2020 12:36 UTC + phase: Testing + phase-changed: Thursday, 27. February 2020 22:32 UTC + proposed-announcement-sent: true + proposed-testing-requested: true reason: - promote-to-proposed: Ongoing -- packages waiting in -proposed for mirror sync + automated-testing: Ongoing -- testing in progress + regression-testing: Ongoing -- testing in progress + security-signoff: Pending -- waiting for signoff + stakeholder-signoff: Pending -- waiting for signoff + verification-testing: Ongoing -- testing in progress trackers: trusty/linux-azure: bug 1864744 xenial/linux-azure/azure-kernel: bug 1864743 variant: debs -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1864745 Title: xenial/linux-azure: 4.15.0-1073.78 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: In Progress Status in Kernel SRU Workflow security-signoff series: Confirmed Status in Kernel SRU Workflow stakeholder-signoff series: Confirmed Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-azure package in Ubuntu: Invalid Status in linux-azure source package in Xenial: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1864753 packages: main: linux-azure meta: linux-meta-azure signed: linux-signed-azure phase: Testing phase-changed: Thursday, 27. February 2020 22:32 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: automated-testing: Ongoing -- testing in progress regression-testing: Ongoing -- testing in progress security-signoff: Pending -- waiting for signoff stakeholder-signoff: Pending -- waiting for signoff verification-testing: Ongoing -- testing in progress trackers: trusty/linux-azure: bug 1864744 xenial/linux-azure/azure-kernel: bug 1864743 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1864745/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1864748] Re: xenial/linux-gcp: 4.15.0-1057.61 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package Status: In Progress => Fix Committed ** Changed in: kernel-sru-workflow/prepare-package Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/prepare-package-meta Status: In Progress => Fix Committed ** Changed in: kernel-sru-workflow/prepare-package-meta Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/prepare-package-signed Status: In Progress => Fix Committed ** Changed in: kernel-sru-workflow/prepare-package-signed Status: Fix Committed => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1864753 packages: main: linux-gcp meta: linux-meta-gcp signed: linux-signed-gcp - phase: Packaging - phase-changed: Wednesday, 26. February 2020 19:22 UTC - reason: - prepare-package: Pending -- package not yet uploaded - prepare-package-meta: Pending -- package not yet uploaded - prepare-package-signed: Pending -- package not yet uploaded + phase: Holding before Promote to Proposed + phase-changed: Thursday, 27. February 2020 20:32 UTC replaces: bug 1863347 trackers: xenial/linux-gcp/gcp-kernel: bug 1864746 xenial/linux-gcp/gke-kernel: bug 1864747 variant: debs -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1864748 Title: xenial/linux-gcp: 4.15.0-1057.61 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-gcp package in Ubuntu: Invalid Status in linux-gcp source package in Xenial: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1864753 packages: main: linux-gcp meta: linux-meta-gcp signed: linux-signed-gcp phase: Holding before Promote to Proposed phase-changed: Thursday, 27. February 2020 20:32 UTC replaces: bug 1863347 trackers: xenial/linux-gcp/gcp-kernel: bug 1864746 xenial/linux-gcp/gke-kernel: bug 1864747 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1864748/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1863347] Re: xenial/linux-gcp: 4.15.0-1056.60 -proposed tracker
** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true - kernel-stable-master-bug: 1863350 + kernel-stable-master-bug: 1864753 packages: main: linux-gcp meta: linux-meta-gcp signed: linux-signed-gcp phase: Testing phase-changed: Thursday, 20. February 2020 23:02 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: regression-testing: Ongoing -- testing in progress security-signoff: Stalled -- waiting for signoff verification-testing: Ongoing -- testing in progress trackers: xenial/linux-gcp/gcp-kernel: bug 1863345 xenial/linux-gcp/gke-kernel: bug 1863346 variant: debs ** Changed in: kernel-sru-workflow/regression-testing Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1864753 packages: main: linux-gcp meta: linux-meta-gcp signed: linux-signed-gcp phase: Testing phase-changed: Thursday, 20. February 2020 23:02 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: - regression-testing: Ongoing -- testing in progress security-signoff: Stalled -- waiting for signoff verification-testing: Ongoing -- testing in progress trackers: xenial/linux-gcp/gcp-kernel: bug 1863345 xenial/linux-gcp/gke-kernel: bug 1863346 variant: debs -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1863347 Title: xenial/linux-gcp: 4.15.0-1056.60 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-gcp package in Ubuntu: Invalid Status in linux-gcp source package in Xenial: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1864753 packages: main: linux-gcp meta: linux-meta-gcp signed: linux-signed-gcp phase: Testing phase-changed: Thursday, 20. February 2020 23:02 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: security-signoff: Stalled -- waiting for signoff verification-testing: Ongoing -- testing in progress trackers: xenial/linux-gcp/gcp-kernel: bug 1863345 xenial/linux-gcp/gke-kernel: bug 1863346 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1863347/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1845687] Re: memory test in ubuntu_kvm_unit tests fails Xenial linux-kvm
the same to failures occur in Eoan 5.3.0-1011.12 linux-kvm ** Changed in: ubuntu-kernel-tests Status: New => Triaged ** Also affects: linux-kvm (Ubuntu Focal) Importance: Undecided Status: New ** Also affects: linux-kvm (Ubuntu Eoan) Importance: Undecided Status: New ** No longer affects: linux-kvm (Ubuntu Focal) -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1845687 Title: memory test in ubuntu_kvm_unit tests fails Xenial linux-kvm Status in ubuntu-kernel-tests: Triaged Status in linux-kvm package in Ubuntu: New Status in linux-kvm source package in Xenial: New Status in linux-kvm source package in Eoan: New Bug description: Series: Xenial Kernel: 4.4.0-1059.66 linux-kvm specifically clfushopt and clwb 09/23 08:43:08 DEBUG| utils:0116| Running 'kvm-ok' 09/23 08:43:08 DEBUG| utils:0153| [stdout] INFO: /dev/kvm exists 09/23 08:43:08 DEBUG| utils:0153| [stdout] KVM acceleration can be used 09/23 08:43:08 DEBUG| utils:0116| Running '/home/ubuntu/autotest/client/tmp/ubuntu_kvm_unit_tests/src/kvm-unit-tests/tests/memory' 09/23 08:43:08 DEBUG| utils:0153| [stdout] BUILD_HEAD=e2c275c4 09/23 08:43:09 DEBUG| utils:0153| [stdout] timeout -k 1s --foreground 90s /usr/bin/qemu-system-x86_64 -nodefaults -device pc-testdev -device isa-debug-exit,iobase=0xf4,iosize=0x4 -vnc none -serial stdio -device pci-testdev -machine accel=kvm -kernel /tmp/tmp.HnxXwZrpQ9 -smp 1 -cpu host # -initrd /tmp/tmp.SL7FtNHKpq 09/23 08:43:09 DEBUG| utils:0153| [stdout] enabling apic 09/23 08:43:09 DEBUG| utils:0153| [stdout] PASS: clflush (present) 09/23 08:43:09 DEBUG| utils:0153| [stdout] PASS: sfence (present) 09/23 08:43:09 DEBUG| utils:0153| [stdout] PASS: lfence (present) 09/23 08:43:09 DEBUG| utils:0153| [stdout] PASS: mfence (present) 09/23 08:43:09 DEBUG| utils:0153| [stdout] FAIL: clflushopt (ABSENT) 09/23 08:43:09 DEBUG| utils:0153| [stdout] FAIL: clwb (ABSENT) 09/23 08:43:09 DEBUG| utils:0153| [stdout] PASS: invalid clwb 09/23 08:43:09 DEBUG| utils:0153| [stdout] PASS: pcommit (ABSENT) 09/23 08:43:09 DEBUG| utils:0153| [stdout] SUMMARY: 8 tests, 2 unexpected failures 09/23 08:43:09 DEBUG| utils:0153| [stdout] FAIL memory (8 tests, 2 unexpected failures) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1845687/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1861909] Re: Please ship ec2-instance-connect.conf instead of creating it in postinst
This bug was fixed in the package ec2-instance-connect - 1.1.12+dfsg1-0ubuntu3~18.04.0 --- ec2-instance-connect (1.1.12+dfsg1-0ubuntu3~18.04.0) bionic; urgency=medium * Rebuild for Bionic ec2-instance-connect (1.1.12+dfsg1-0ubuntu3) focal; urgency=medium * debian/preinst: Don't remove ec2-instance-connect.conf manually on upgrade * debian/prerm: Drop obsolete file ec2-instance-connect (1.1.12+dfsg1-0ubuntu2) focal; urgency=medium * Ship ssh.service drop-in instead of handling placement in maintainer scripts (LP: #1861909) ec2-instance-connect (1.1.12+dfsg1-0ubuntu1) focal; urgency=medium [ Balint Reczey ] * New upstream version 1.1.11: - Removing errant write to /tmp - Cleaning up bad bash practices, including umask race condition - Fix for an update to openssl (or dependencies) affecting behavior of CApath option on openssl verify - Fixing Nitro behavior of hostkey harvesting - Adding additional licensing headers * New upstream version 1.1.12 (LP: #1860142): - Adding support for Instance Metadata Service Version 2 - Modifying cURL invocation to avoid need for eval - Cleaning up shellcheck catches * debian/install: Adjust for new upstream source layout * Suppress systemctl messages and ignore error in maintainer scripts * Bump compat level to 10 [ LordAlfredo ] * Rely on debhelper to enable and start systemd service -- Balint Reczey Mon, 10 Feb 2020 21:26:44 +0100 ** Changed in: ec2-instance-connect (Ubuntu Bionic) Status: Fix Committed => Fix Released ** Changed in: ec2-instance-connect (Ubuntu Xenial) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1861909 Title: Please ship ec2-instance-connect.conf instead of creating it in postinst Status in ec2-instance-connect package in Ubuntu: Fix Released Status in ec2-instance-connect source package in Xenial: Fix Released Status in ec2-instance-connect source package in Bionic: Fix Released Status in ec2-instance-connect source package in Eoan: Fix Released Bug description: [Impact] * The ssh.service drop-in is placed and removed in maintainer scripts based on the current ssh configuration checks which are incomplete. The drop-in is also not owned by the package. [Test Case] * Install the fixed package. The drop-in should be listed among the package's files: $ dpkg -L ec2-instance-connect ... /lib/systemd/system/ssh.service.d/ec2-instance-connect.conf ... * Upgrade package from previous version. The drop-in should replace the old one. * Change /etc/ssh/sshd_config to set AuthorizedKeysCommand Install the fixed package. A warning should appear and sshd should not be restarted by the package's maintainer scripts. [Regression Potential] * The change is made to make installation and upgrades more reliable. The test cases check package installs and upgrades where regressions could happen due to implementation mistakes. * The unfixed version of the package did not place the drop-in when it detected setting AuthorizedKeysCommand in sshd_conf, while the fixed version installs the drop-in, just does not restart the ssh service. This can block users from logging in via ssh if only the sshd_conf's AuthorizedKeysCommand configuration enabled their login and the ssh service got restarted after installing/upgrading ec2-instance-connect. This is a known change in behavior and is mitigated by showing a warning when this potentially problematic configuration is detected. It is also worth noting that in case the drop-in overrides the configuration in sshd_conf it is still possible to log in via EC2 Instance Connect, the login method the package enables. [Other Info] To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ec2-instance-connect/+bug/1861909/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1860142] Re: Please update ec2-instance-connect to 1.1.12 release
This bug was fixed in the package ec2-instance-connect - 1.1.12+dfsg1-0ubuntu3~18.04.0 --- ec2-instance-connect (1.1.12+dfsg1-0ubuntu3~18.04.0) bionic; urgency=medium * Rebuild for Bionic ec2-instance-connect (1.1.12+dfsg1-0ubuntu3) focal; urgency=medium * debian/preinst: Don't remove ec2-instance-connect.conf manually on upgrade * debian/prerm: Drop obsolete file ec2-instance-connect (1.1.12+dfsg1-0ubuntu2) focal; urgency=medium * Ship ssh.service drop-in instead of handling placement in maintainer scripts (LP: #1861909) ec2-instance-connect (1.1.12+dfsg1-0ubuntu1) focal; urgency=medium [ Balint Reczey ] * New upstream version 1.1.11: - Removing errant write to /tmp - Cleaning up bad bash practices, including umask race condition - Fix for an update to openssl (or dependencies) affecting behavior of CApath option on openssl verify - Fixing Nitro behavior of hostkey harvesting - Adding additional licensing headers * New upstream version 1.1.12 (LP: #1860142): - Adding support for Instance Metadata Service Version 2 - Modifying cURL invocation to avoid need for eval - Cleaning up shellcheck catches * debian/install: Adjust for new upstream source layout * Suppress systemctl messages and ignore error in maintainer scripts * Bump compat level to 10 [ LordAlfredo ] * Rely on debhelper to enable and start systemd service -- Balint Reczey Mon, 10 Feb 2020 21:26:44 +0100 ** Changed in: ec2-instance-connect (Ubuntu Bionic) Status: Fix Committed => Fix Released ** Changed in: ec2-instance-connect (Ubuntu Xenial) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1860142 Title: Please update ec2-instance-connect to 1.1.12 release Status in ec2-instance-connect package in Ubuntu: Fix Released Status in ec2-instance-connect source package in Xenial: Fix Released Status in ec2-instance-connect source package in Bionic: Fix Released Status in ec2-instance-connect source package in Disco: Won't Fix Status in ec2-instance-connect source package in Eoan: Fix Released Bug description: [Impact] New upstream release of the package providing SSH access to instances; available to any AWS users. The most notable new feature is supporting Instance Metadata Service Version 2, but since the release included major rewrite which honored on Security Team's input the package is backported in full. [Test Cases] This is manually tested by Amazon: 0) Deploy an Amazon AWS instance with Instance Connect feature enabled 1) Install the previous version of the ec2-instance-connect package 2) Verify that the sshd process has been restarted with the changed command-line, now including "AuthorizedKeysCommand*" options. 3) Attempt to connect to the instance using a SSH key that is known by the Instance Connect service. 4) Upgrade to the new version of the package 5) Attempt to connect to the instance using a SSH key that is known by the Instance Connect service. 6) Purge the ec2-instance-connect package 7) Configure the instance to use IMDSv2 8) Install the new ec2-instance-connect again and verify that is working again (steps 2 and 3) [Regression Potential] Limited to SSH access on instances where the package gets installed. This package will be installed by default for a new service called "Instance Connect" provided to AWS customers. In the case of an issue, things to watch out for would be for some keys to not be usable to connect to the instance when they are expected to be, as the list of authorized keys is collated by the service to include both the usual authorized_keys contents, as well as keys provided by the Instance Connect service. The package upgrade is covered in the test case. [Other Info] The source difference for the SRUs contain a lot of extra files because the source now contains almost the full upstream tarball, but the difference between the binary packages is still minimal and it maybe easier to reviewing that difference. Disco SRU is skipped because it goes EOL before the aging of the package would finish. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ec2-instance-connect/+bug/1860142/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1860142] Re: Please update ec2-instance-connect to 1.1.12 release
This bug was fixed in the package ec2-instance-connect - 1.1.12+dfsg1-0ubuntu3~19.10.0 --- ec2-instance-connect (1.1.12+dfsg1-0ubuntu3~19.10.0) eoan; urgency=medium * Rebuild for Eoan ec2-instance-connect (1.1.12+dfsg1-0ubuntu3) focal; urgency=medium * debian/preinst: Don't remove ec2-instance-connect.conf manually on upgrade * debian/prerm: Drop obsolete file ec2-instance-connect (1.1.12+dfsg1-0ubuntu2) focal; urgency=medium * Ship ssh.service drop-in instead of handling placement in maintainer scripts (LP: #1861909) ec2-instance-connect (1.1.12+dfsg1-0ubuntu1) focal; urgency=medium [ Balint Reczey ] * New upstream version 1.1.11: - Removing errant write to /tmp - Cleaning up bad bash practices, including umask race condition - Fix for an update to openssl (or dependencies) affecting behavior of CApath option on openssl verify - Fixing Nitro behavior of hostkey harvesting - Adding additional licensing headers * New upstream version 1.1.12 (LP: #1860142): - Adding support for Instance Metadata Service Version 2 - Modifying cURL invocation to avoid need for eval - Cleaning up shellcheck catches * debian/install: Adjust for new upstream source layout * Suppress systemctl messages and ignore error in maintainer scripts * Bump compat level to 10 [ LordAlfredo ] * Rely on debhelper to enable and start systemd service -- Balint Reczey Mon, 10 Feb 2020 21:26:44 +0100 ** Changed in: ec2-instance-connect (Ubuntu Eoan) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1860142 Title: Please update ec2-instance-connect to 1.1.12 release Status in ec2-instance-connect package in Ubuntu: Fix Released Status in ec2-instance-connect source package in Xenial: Fix Released Status in ec2-instance-connect source package in Bionic: Fix Released Status in ec2-instance-connect source package in Disco: Won't Fix Status in ec2-instance-connect source package in Eoan: Fix Released Bug description: [Impact] New upstream release of the package providing SSH access to instances; available to any AWS users. The most notable new feature is supporting Instance Metadata Service Version 2, but since the release included major rewrite which honored on Security Team's input the package is backported in full. [Test Cases] This is manually tested by Amazon: 0) Deploy an Amazon AWS instance with Instance Connect feature enabled 1) Install the previous version of the ec2-instance-connect package 2) Verify that the sshd process has been restarted with the changed command-line, now including "AuthorizedKeysCommand*" options. 3) Attempt to connect to the instance using a SSH key that is known by the Instance Connect service. 4) Upgrade to the new version of the package 5) Attempt to connect to the instance using a SSH key that is known by the Instance Connect service. 6) Purge the ec2-instance-connect package 7) Configure the instance to use IMDSv2 8) Install the new ec2-instance-connect again and verify that is working again (steps 2 and 3) [Regression Potential] Limited to SSH access on instances where the package gets installed. This package will be installed by default for a new service called "Instance Connect" provided to AWS customers. In the case of an issue, things to watch out for would be for some keys to not be usable to connect to the instance when they are expected to be, as the list of authorized keys is collated by the service to include both the usual authorized_keys contents, as well as keys provided by the Instance Connect service. The package upgrade is covered in the test case. [Other Info] The source difference for the SRUs contain a lot of extra files because the source now contains almost the full upstream tarball, but the difference between the binary packages is still minimal and it maybe easier to reviewing that difference. Disco SRU is skipped because it goes EOL before the aging of the package would finish. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ec2-instance-connect/+bug/1860142/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1861909] Re: Please ship ec2-instance-connect.conf instead of creating it in postinst
This bug was fixed in the package ec2-instance-connect - 1.1.12+dfsg1-0ubuntu3~19.10.0 --- ec2-instance-connect (1.1.12+dfsg1-0ubuntu3~19.10.0) eoan; urgency=medium * Rebuild for Eoan ec2-instance-connect (1.1.12+dfsg1-0ubuntu3) focal; urgency=medium * debian/preinst: Don't remove ec2-instance-connect.conf manually on upgrade * debian/prerm: Drop obsolete file ec2-instance-connect (1.1.12+dfsg1-0ubuntu2) focal; urgency=medium * Ship ssh.service drop-in instead of handling placement in maintainer scripts (LP: #1861909) ec2-instance-connect (1.1.12+dfsg1-0ubuntu1) focal; urgency=medium [ Balint Reczey ] * New upstream version 1.1.11: - Removing errant write to /tmp - Cleaning up bad bash practices, including umask race condition - Fix for an update to openssl (or dependencies) affecting behavior of CApath option on openssl verify - Fixing Nitro behavior of hostkey harvesting - Adding additional licensing headers * New upstream version 1.1.12 (LP: #1860142): - Adding support for Instance Metadata Service Version 2 - Modifying cURL invocation to avoid need for eval - Cleaning up shellcheck catches * debian/install: Adjust for new upstream source layout * Suppress systemctl messages and ignore error in maintainer scripts * Bump compat level to 10 [ LordAlfredo ] * Rely on debhelper to enable and start systemd service -- Balint Reczey Mon, 10 Feb 2020 21:26:44 +0100 ** Changed in: ec2-instance-connect (Ubuntu Eoan) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1861909 Title: Please ship ec2-instance-connect.conf instead of creating it in postinst Status in ec2-instance-connect package in Ubuntu: Fix Released Status in ec2-instance-connect source package in Xenial: Fix Released Status in ec2-instance-connect source package in Bionic: Fix Released Status in ec2-instance-connect source package in Eoan: Fix Released Bug description: [Impact] * The ssh.service drop-in is placed and removed in maintainer scripts based on the current ssh configuration checks which are incomplete. The drop-in is also not owned by the package. [Test Case] * Install the fixed package. The drop-in should be listed among the package's files: $ dpkg -L ec2-instance-connect ... /lib/systemd/system/ssh.service.d/ec2-instance-connect.conf ... * Upgrade package from previous version. The drop-in should replace the old one. * Change /etc/ssh/sshd_config to set AuthorizedKeysCommand Install the fixed package. A warning should appear and sshd should not be restarted by the package's maintainer scripts. [Regression Potential] * The change is made to make installation and upgrades more reliable. The test cases check package installs and upgrades where regressions could happen due to implementation mistakes. * The unfixed version of the package did not place the drop-in when it detected setting AuthorizedKeysCommand in sshd_conf, while the fixed version installs the drop-in, just does not restart the ssh service. This can block users from logging in via ssh if only the sshd_conf's AuthorizedKeysCommand configuration enabled their login and the ssh service got restarted after installing/upgrading ec2-instance-connect. This is a known change in behavior and is mitigated by showing a warning when this potentially problematic configuration is detected. It is also worth noting that in case the drop-in overrides the configuration in sshd_conf it is still possible to log in via EC2 Instance Connect, the login method the package enables. [Other Info] To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ec2-instance-connect/+bug/1861909/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1864752] Re: xenial/linux-hwe: 4.15.0-90.91~16.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/automated-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/certification-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-proposed Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/regression-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/security-signoff Status: New => Confirmed ** Changed in: kernel-sru-workflow/verification-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/automated-testing Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/regression-testing Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/verification-testing Status: Confirmed => In Progress -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1864752 Title: xenial/linux-hwe: 4.15.0-90.91~16.04.1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: In Progress Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: In Progress Status in Kernel SRU Workflow security-signoff series: Confirmed Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-hwe package in Ubuntu: Invalid Status in linux-hwe source package in Xenial: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1864753 packages: main: linux-hwe meta: linux-meta-hwe signed: linux-signed-hwe phase: Testing phase-changed: Thursday, 27. February 2020 15:02 UTC reason: automated-testing: Ongoing -- testing in progress certification-testing: Ongoing -- testing in progress regression-testing: Ongoing -- testing in progress security-signoff: Pending -- waiting for signoff verification-testing: Ongoing -- testing in progress trackers: xenial/linux-deeplens: bug 1864751 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1864752/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1864707] Re: arbitrary command execution vulnerability
My bad, I thought this was fixed by the sync, but it looks like it got caught up by the debian import freeze. ** Changed in: opensmtpd (Ubuntu) Status: Fix Released => Confirmed -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1864707 Title: arbitrary command execution vulnerability Status in opensmtpd package in Ubuntu: Confirmed Status in opensmtpd source package in Xenial: Confirmed Status in opensmtpd source package in Bionic: Confirmed Status in opensmtpd source package in Eoan: Confirmed Status in opensmtpd package in Debian: Unknown Bug description: OpenBSD 6.6 errata 021, February 24, 2020: An out of bounds read in smtpd allows an attacker to inject arbitrary commands into the envelope file which are then executed as root. Separately, missing privilege revocation in smtpctl allows arbitrary commands to be run with the _smtpq group. This affects Debian versions since 5.7.3p2 (released upstream 2016-02-02). In particular, every Ubuntu release since xenial is affected. Quoting from the advisory: This vulnerability, an out-of-bounds read introduced in December 2015 (commit 80c6a60c, "when peer outputs a multi-line response ..."), is exploitable remotely and leads to the execution of arbitrary shell commands: either as root, after May 2018 (commit a8e22235, "switch smtpd to new grammar"); or as any non-root user, before May 2018. https://www.openwall.com/lists/oss-security/2020/02/24/5 The other advisory fixed by the patches does not appear to affect Debian because /proc/sys/fs/protected_hardlinks is 1 by default: https://www.openwall.com/lists/oss-security/2020/02/24/4 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/opensmtpd/+bug/1864707/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1864751] Re: xenial/linux-deeplens: 4.15.0-1018.18 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Invalid ** Changed in: kernel-sru-workflow/security-signoff Status: New => Invalid ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1864752 packages: main: linux-deeplens meta: linux-meta-deeplens - phase: Ready for Packaging - phase-changed: Wednesday, 26. February 2020 12:43 UTC + phase: Packaging + phase-changed: Thursday, 27. February 2020 13:07 UTC reason: - prepare-package: Pending -- version not specified + prepare-package: Pending -- package not yet uploaded + prepare-package-meta: Pending -- package not yet uploaded replaces: bug 1863348 variant: debs -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1864751 Title: xenial/linux-deeplens: 4.15.0-1018.18 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Invalid Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: Invalid Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1864752 packages: main: linux-deeplens meta: linux-meta-deeplens phase: Packaging phase-changed: Thursday, 27. February 2020 13:07 UTC reason: prepare-package: Pending -- package not yet uploaded prepare-package-meta: Pending -- package not yet uploaded replaces: bug 1863348 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1864751/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1864733] Re: xenial/linux-aws-hwe: 4.15.0-1062.66~16.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package Status: In Progress => Fix Committed ** Changed in: kernel-sru-workflow/prepare-package Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/prepare-package-meta Status: In Progress => Fix Committed ** Changed in: kernel-sru-workflow/prepare-package-meta Status: Fix Committed => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1864734 packages: main: linux-aws-hwe meta: linux-meta-aws-hwe - phase: Packaging - phase-changed: Thursday, 27. February 2020 11:47 UTC - reason: - prepare-package: Pending -- package not yet uploaded - prepare-package-meta: Pending -- package not yet uploaded + phase: Holding before Promote to Proposed + phase-changed: Thursday, 27. February 2020 12:16 UTC replaces: bug 1863320 variant: debs -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1864733 Title: xenial/linux-aws-hwe: 4.15.0-1062.66~16.04.1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-aws-hwe package in Ubuntu: Invalid Status in linux-aws-hwe source package in Xenial: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1864734 packages: main: linux-aws-hwe meta: linux-meta-aws-hwe phase: Holding before Promote to Proposed phase-changed: Thursday, 27. February 2020 12:16 UTC replaces: bug 1863320 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1864733/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1861452] Re: sru curtin 2020-02-14 - 19.3-26-g82f23e3d-0ubuntu1
This bug was fixed in the package curtin - 19.3-26-g82f23e3d- 0ubuntu1~18.04.1 --- curtin (19.3-26-g82f23e3d-0ubuntu1~18.04.1) bionic; urgency=medium * New upstream snapshot. (LP: #1861452) - install-grub: refactor uefi partition/disk searching - doc: update Canonical contributors URL [Paul Tobias] - block-discover: detect additional "extended" partition types in MBR - vmtests: skip focal bcache tests due to kernel bug - net/deps.py: detect openvswitch cfg and install openvswitch packages - vmtest: collection of vmtest related fixes to make things triple green - clear-holders: umap the parent mpath to wipe the underlying partitions - vmtests: bump fixby date out and fix false positive when date passes - vmtests: drop disco tests using a tool to automate the process -- Ryan Harper Fri, 14 Feb 2020 09:50:11 -0600 ** Changed in: curtin (Ubuntu Xenial) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1861452 Title: sru curtin 2020-02-14 - 19.3-26-g82f23e3d-0ubuntu1 Status in curtin package in Ubuntu: Fix Released Status in curtin source package in Xenial: Fix Released Status in curtin source package in Bionic: Fix Released Status in curtin source package in Eoan: Fix Released Bug description: == Begin SRU Template == [Impact] This release sports both bug-fixes and new features and we would like to make sure all of our supported customers have access to these improvements. The notable ones are: - multipath removal handling - centos8 support - curthooks update initramfs only once for faster deployment - block schema updates for raid, vtoc and ptable - vmtest arch support for ppc64le and aarch64 See the changelog entry below for a full list of changes and bugs. [Test Case] The following development and SRU process was followed: https://wiki.ubuntu.com/CurtinUpdates Curtin now contains an extensive integration test suite that is ran using the SRU package for each releases. These suite has documentation here: https://curtin.readthedocs.io/en/latest/topics/integration-testing.html In order to avoid regression to existing MAAS product, the MAAS team will run their continuous integration test against the curtin that is in -proposed. A successful run will be required before the proposed curtin can be let into -updates. The curtin team will be in charge of attaching the artifacts and console output of the appropriate run to the bug. Curtin team members will not mark ‘verification-done’ until this has happened. [Regression Potential] In order to mitigate the regression potential, the results of the aforementioned integration tests are attached to this bug. Curtin VMTEST results attached: - curtin-vmtest-proposed-x-console.log - curtin-vmtest-proposed-x-artifacts.tar.xz - curtin-vmtest-proposed-x-console-v2.log - curtin-vmtest-proposed-x-artifacts-v2.tar.xz - curtin-vmtest-proposed-b-console.log - curtin-vmtest-proposed-b-artifacts.tar.xz - curtin-vmtest-proposed-b-console-v2.log - curtin-vmtest-proposed-b-artifacts-v2.tar.xz - curtin-vmtest-proposed-e-console.log - curtin-vmtest-proposed-e-artifacts.tar.xz - curtin-vmtest-proposed-e-artifacts-v2.tar.xz MAAS QA proposed results attached: - maas-qa-curtin-sru-xenial.zip - maas-qa-curtin-sru-bionic.zip CDO QA results - https://solutions.qa.canonical.com/#/testplans/testplaninstance/e303f452-9467-4f55-9eec-49dd3b6aeff6 [Discussion] == End SRU Template == == changelog == curtin (19.3-26-g82f23e3d-0ubuntu1~19.10.1) - install-grub: refactor uefi partition/disk searching (LP: #1862846) - doc: update Canonical contributors URL [Paul Tobias] - block-discover: detect additional "extended" partition types in MBR (LP: #1861251) - vmtests: skip focal bcache tests due to kernel bug - net/deps.py: detect openvswitch cfg and install openvswitch packages - vmtest: collection of vmtest related fixes to make things triple green (LP: #1862971) - clear-holders: umap the parent mpath to wipe the underlying partitions (LP: #1862973) - vmtests: bump fixby date out and fix false positive when date passes - vmtests: drop disco tests using a tool to automate the process curtin (19.3-17-g50ffca46-0ubuntu1~19.10.1) - clear-holders: ensure we wipe device even if multipath enabled not not mp - block_meta: use reliable fs_spec entries for block devices (LP: #1851899) - multipath: handle removal of multipath partitions correctly (LP: #1857042) - vmtests: skip Focal deploying Centos70 ScsiBasic - vmtests: fix network mtu tests, separating ifupdown vs networkd
[Group.of.nepali.translators] [Bug 1857051] Re: Please add ${distro_id}ESM:${distro_codename}-infra-security and ${distro_id}ESMApps:${distro_codename}-apps-security to allowed origins (on Ubuntu)
This bug was fixed in the package unattended-upgrades - 1.1ubuntu1.18.04.14 --- unattended-upgrades (1.1ubuntu1.18.04.14) bionic; urgency=medium * data/50unattended-upgrades.Ubuntu: add new ESM repositories (LP: #1857051) -- Balint Reczey Mon, 17 Feb 2020 12:37:03 +0100 ** Changed in: unattended-upgrades (Ubuntu Bionic) Status: Fix Committed => Fix Released ** Changed in: unattended-upgrades (Ubuntu Xenial) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1857051 Title: Please add ${distro_id}ESM:${distro_codename}-infra-security and ${distro_id}ESMApps:${distro_codename}-apps-security to allowed origins (on Ubuntu) Status in unattended-upgrades package in Ubuntu: Fix Released Status in unattended-upgrades source package in Trusty: Won't Fix Status in unattended-upgrades source package in Xenial: Fix Released Status in unattended-upgrades source package in Bionic: Fix Released Status in unattended-upgrades source package in Eoan: Fix Released Bug description: [Impact] * Changes to the ESM repo naming and the introduction of the new esm-infra and esm-apps suites require an update to unattended-upgrades to ensure the security pockets are used. * This change will ensure users are actually receiving updates, where as today they will not without making manual changes. [Test Case] * 1) Bionic and Xenial ESM-Apps/ESM-infra with Ubuntu Pro * 2) Trusty ESM [Regression Potential] * This change is ensuring users actually receive security updates when using ESM. Therefore, 1) users of ESM-apps on Ubuntu Pro and 2) ESM-infra on Trusty will be the only users affected. * The possible issue would be if/when users receive actual security updates that then regress or cause issues to the system. [Other Info] Previous description: ESM -infra-security and -apps-security will need to participate in unattended upgrades. Currently /etc/apt/apt.conf.d/50unattended-upgrades provides: Unattended-Upgrade::Allowed-Origins { "${distro_id}ESM:${distro_codename}"; } Given that there have been ESM apt pocket renames over the last few months, the above ESM allowed-origin should not apply anymore and can be dropped or replaced. See RT #C122697 and #C121067 for the pocket/suite renames related to ESM What is needed after the ESM apt pocket/suite renames: Support for unattended upgrades for ESM for Infrastructure customers: Unattended-Upgrade::Allowed-Origins { // Extended Security Maintenance; doesn't necessarily exist for // every release and this system may not have it installed, but if // available, the policy for updates is such that unattended-upgrades // should also install from here by default. "${distro_id}ESM:${distro_codename}-infra-security"; "${distro_id}ESMApps:${distro_codename}-apps-security"; }; === Confirmed proper origin on an attached Trusty instance with ESM- infra enabled: 500 https://esm.ubuntu.com/ubuntu/ trusty-infra-security/main amd64 Packages release v=14.04,o=UbuntuESM,a=trusty-infra-security,n=trusty,l=UbuntuESM,c=main === Confirmed proper origins on Bionic for enabled ESM-infra and ESM-apps on an AWS Ubuntu PRO instance: 500 https://esm.ubuntu.com/infra/ubuntu bionic-infra-security/main amd64 Packages release v=18.04,o=UbuntuESM,a=bionic-infra-security,n=bionic,l=UbuntuESM,c=main,b=amd64 500 https://esm.ubuntu.com/apps/ubuntu bionic-apps-security/main amd64 Packages release v=18.04,o=UbuntuESMApps,a=bionic-apps-security,n=bionic,l=UbuntuESMApps,c=main,b=amd64 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/unattended-upgrades/+bug/1857051/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1861452] Re: sru curtin 2020-02-14 - 19.3-26-g82f23e3d-0ubuntu1
This bug was fixed in the package curtin - 19.3-26-g82f23e3d- 0ubuntu1~19.10.1 --- curtin (19.3-26-g82f23e3d-0ubuntu1~19.10.1) eoan; urgency=medium * New upstream snapshot. (LP: #1861452) - install-grub: refactor uefi partition/disk searching - doc: update Canonical contributors URL [Paul Tobias] - block-discover: detect additional "extended" partition types in MBR - vmtests: skip focal bcache tests due to kernel bug - net/deps.py: detect openvswitch cfg and install openvswitch packages - vmtest: collection of vmtest related fixes to make things triple green - clear-holders: umap the parent mpath to wipe the underlying partitions - vmtests: bump fixby date out and fix false positive when date passes - vmtests: drop disco tests using a tool to automate the process -- Ryan Harper Fri, 14 Feb 2020 09:38:22 -0600 ** Changed in: curtin (Ubuntu Eoan) Status: Fix Committed => Fix Released ** Changed in: curtin (Ubuntu Bionic) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1861452 Title: sru curtin 2020-02-14 - 19.3-26-g82f23e3d-0ubuntu1 Status in curtin package in Ubuntu: Fix Released Status in curtin source package in Xenial: Fix Released Status in curtin source package in Bionic: Fix Released Status in curtin source package in Eoan: Fix Released Bug description: == Begin SRU Template == [Impact] This release sports both bug-fixes and new features and we would like to make sure all of our supported customers have access to these improvements. The notable ones are: - multipath removal handling - centos8 support - curthooks update initramfs only once for faster deployment - block schema updates for raid, vtoc and ptable - vmtest arch support for ppc64le and aarch64 See the changelog entry below for a full list of changes and bugs. [Test Case] The following development and SRU process was followed: https://wiki.ubuntu.com/CurtinUpdates Curtin now contains an extensive integration test suite that is ran using the SRU package for each releases. These suite has documentation here: https://curtin.readthedocs.io/en/latest/topics/integration-testing.html In order to avoid regression to existing MAAS product, the MAAS team will run their continuous integration test against the curtin that is in -proposed. A successful run will be required before the proposed curtin can be let into -updates. The curtin team will be in charge of attaching the artifacts and console output of the appropriate run to the bug. Curtin team members will not mark ‘verification-done’ until this has happened. [Regression Potential] In order to mitigate the regression potential, the results of the aforementioned integration tests are attached to this bug. Curtin VMTEST results attached: - curtin-vmtest-proposed-x-console.log - curtin-vmtest-proposed-x-artifacts.tar.xz - curtin-vmtest-proposed-x-console-v2.log - curtin-vmtest-proposed-x-artifacts-v2.tar.xz - curtin-vmtest-proposed-b-console.log - curtin-vmtest-proposed-b-artifacts.tar.xz - curtin-vmtest-proposed-b-console-v2.log - curtin-vmtest-proposed-b-artifacts-v2.tar.xz - curtin-vmtest-proposed-e-console.log - curtin-vmtest-proposed-e-artifacts.tar.xz - curtin-vmtest-proposed-e-artifacts-v2.tar.xz MAAS QA proposed results attached: - maas-qa-curtin-sru-xenial.zip - maas-qa-curtin-sru-bionic.zip CDO QA results - https://solutions.qa.canonical.com/#/testplans/testplaninstance/e303f452-9467-4f55-9eec-49dd3b6aeff6 [Discussion] == End SRU Template == == changelog == curtin (19.3-26-g82f23e3d-0ubuntu1~19.10.1) - install-grub: refactor uefi partition/disk searching (LP: #1862846) - doc: update Canonical contributors URL [Paul Tobias] - block-discover: detect additional "extended" partition types in MBR (LP: #1861251) - vmtests: skip focal bcache tests due to kernel bug - net/deps.py: detect openvswitch cfg and install openvswitch packages - vmtest: collection of vmtest related fixes to make things triple green (LP: #1862971) - clear-holders: umap the parent mpath to wipe the underlying partitions (LP: #1862973) - vmtests: bump fixby date out and fix false positive when date passes - vmtests: drop disco tests using a tool to automate the process curtin (19.3-17-g50ffca46-0ubuntu1~19.10.1) - clear-holders: ensure we wipe device even if multipath enabled not not mp - block_meta: use reliable fs_spec entries for block devices (LP: #1851899) - multipath: handle removal of multipath partitions correctly (LP: #1857042) - vmtests: skip Focal deploying Centos70 ScsiBa
[Group.of.nepali.translators] [Bug 1857051] Re: Please add ${distro_id}ESM:${distro_codename}-infra-security and ${distro_id}ESMApps:${distro_codename}-apps-security to allowed origins (on Ubuntu)
This bug was fixed in the package unattended-upgrades - 1.14ubuntu1.2 --- unattended-upgrades (1.14ubuntu1.2) eoan; urgency=medium * data/50unattended-upgrades.Ubuntu: add new ESM repositories (LP: #1857051) * Update md5sum of 50unattended-upgrades.Ubuntu -- Balint Reczey Mon, 17 Feb 2020 12:29:17 +0100 ** Changed in: unattended-upgrades (Ubuntu Eoan) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1857051 Title: Please add ${distro_id}ESM:${distro_codename}-infra-security and ${distro_id}ESMApps:${distro_codename}-apps-security to allowed origins (on Ubuntu) Status in unattended-upgrades package in Ubuntu: Fix Released Status in unattended-upgrades source package in Trusty: Won't Fix Status in unattended-upgrades source package in Xenial: Fix Released Status in unattended-upgrades source package in Bionic: Fix Released Status in unattended-upgrades source package in Eoan: Fix Released Bug description: [Impact] * Changes to the ESM repo naming and the introduction of the new esm-infra and esm-apps suites require an update to unattended-upgrades to ensure the security pockets are used. * This change will ensure users are actually receiving updates, where as today they will not without making manual changes. [Test Case] * 1) Bionic and Xenial ESM-Apps/ESM-infra with Ubuntu Pro * 2) Trusty ESM [Regression Potential] * This change is ensuring users actually receive security updates when using ESM. Therefore, 1) users of ESM-apps on Ubuntu Pro and 2) ESM-infra on Trusty will be the only users affected. * The possible issue would be if/when users receive actual security updates that then regress or cause issues to the system. [Other Info] Previous description: ESM -infra-security and -apps-security will need to participate in unattended upgrades. Currently /etc/apt/apt.conf.d/50unattended-upgrades provides: Unattended-Upgrade::Allowed-Origins { "${distro_id}ESM:${distro_codename}"; } Given that there have been ESM apt pocket renames over the last few months, the above ESM allowed-origin should not apply anymore and can be dropped or replaced. See RT #C122697 and #C121067 for the pocket/suite renames related to ESM What is needed after the ESM apt pocket/suite renames: Support for unattended upgrades for ESM for Infrastructure customers: Unattended-Upgrade::Allowed-Origins { // Extended Security Maintenance; doesn't necessarily exist for // every release and this system may not have it installed, but if // available, the policy for updates is such that unattended-upgrades // should also install from here by default. "${distro_id}ESM:${distro_codename}-infra-security"; "${distro_id}ESMApps:${distro_codename}-apps-security"; }; === Confirmed proper origin on an attached Trusty instance with ESM- infra enabled: 500 https://esm.ubuntu.com/ubuntu/ trusty-infra-security/main amd64 Packages release v=14.04,o=UbuntuESM,a=trusty-infra-security,n=trusty,l=UbuntuESM,c=main === Confirmed proper origins on Bionic for enabled ESM-infra and ESM-apps on an AWS Ubuntu PRO instance: 500 https://esm.ubuntu.com/infra/ubuntu bionic-infra-security/main amd64 Packages release v=18.04,o=UbuntuESM,a=bionic-infra-security,n=bionic,l=UbuntuESM,c=main,b=amd64 500 https://esm.ubuntu.com/apps/ubuntu bionic-apps-security/main amd64 Packages release v=18.04,o=UbuntuESMApps,a=bionic-apps-security,n=bionic,l=UbuntuESMApps,c=main,b=amd64 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/unattended-upgrades/+bug/1857051/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1853493] Re: SRU 1.8 tracking bug
** Changed in: ubuntu-image Status: In Progress => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1853493 Title: SRU 1.8 tracking bug Status in Ubuntu Image: Fix Released Status in ubuntu-image package in Ubuntu: Fix Released Status in ubuntu-image source package in Xenial: Fix Released Status in ubuntu-image source package in Bionic: Fix Released Status in ubuntu-image source package in Disco: Fix Released Status in ubuntu-image source package in Eoan: Fix Released Bug description: New SRU tracking bug (with exception) for ubuntu-image 1.8 in Eoan, Disco, Bionic and Xenial. See https://wiki.ubuntu.com/UbuntuImageUpdates [Impact] ubuntu-image 1.8 fixes some bugs and pays down some technical debt. This release comes with two new features: support for the littlekernel bootloader and support for uc20-type image builds (with its new roles). [Test Case] Create an image using the official amd64 model assertion. Ensure that the resulting image boots to 'press enter to configure' phase. Create an ubuntu-cpc project classic image using a modified amd64 gadget tree [1] and make sure it boots. Optionally, a uc20 model-assertion ubuntu-core build could be performed as part of the validation. [Regression Potential] * ubuntu-image may not produce a bootable image [1] For example: https://github.com/sil2100/pc-amd64-gadget To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-image/+bug/1853493/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1828827] Re: SRU 1.7 tracking bug
** Changed in: ubuntu-image Status: In Progress => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1828827 Title: SRU 1.7 tracking bug Status in Ubuntu Image: Fix Released Status in ubuntu-image package in Ubuntu: Fix Released Status in ubuntu-image source package in Xenial: Fix Released Status in ubuntu-image source package in Bionic: Fix Released Status in ubuntu-image source package in Cosmic: Fix Released Status in ubuntu-image source package in Disco: Fix Released Bug description: New SRU tracking bug (with exception) for ubuntu-image 1.7 in Disco, Cosmic, Bionic and Xenial. See https://wiki.ubuntu.com/UbuntuImageUpdates [Impact] ubuntu-image 1.7 fixes some bugs and pays down some technical debt. Besides test-fixes and some improvements regarding schema parsing, this version also adds support for the new --snap syntax (replacing the now-deprecated --extra-snaps argument). [Test Case] Create an image using the official amd64 model assertion. Ensure that the resulting image boots to 'press enter to configure' phase. Create an ubuntu-cpc project classic image using a modified amd64 gadget tree [1] and make sure it boots. [Regression Potential] * ubuntu-image may not produce a bootable image * Old uses of the deprecated --extra-snaps commandline arguments might not work [1] For example: https://github.com/sil2100/pc-amd64-gadget To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-image/+bug/1828827/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp