[Group.of.nepali.translators] [Bug 1865495] Re: xenial/linux-deeplens: 4.15.0-1019.19 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Invalid ** Changed in: kernel-sru-workflow/security-signoff Status: New => Invalid ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1865142 packages: main: linux-deeplens meta: linux-meta-deeplens - phase: Ready for Packaging - phase-changed: Monday, 02. March 2020 13:42 UTC + phase: Packaging + phase-changed: Tuesday, 03. March 2020 04:53 UTC reason: - prepare-package: Pending -- version not specified + prepare-package: Pending -- package not yet uploaded + prepare-package-meta: Pending -- package not yet uploaded replaces: bug 1864751 variant: debs -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1865495 Title: xenial/linux-deeplens: 4.15.0-1019.19 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Invalid Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: Invalid Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1865142 packages: main: linux-deeplens meta: linux-meta-deeplens phase: Packaging phase-changed: Tuesday, 03. March 2020 04:53 UTC reason: prepare-package: Pending -- package not yet uploaded prepare-package-meta: Pending -- package not yet uploaded replaces: bug 1864751 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1865495/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1865199] Re: xenial/linux-fips: 4.4.0-1031.36 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Invalid ** Changed in: kernel-sru-workflow/security-signoff Status: New => Invalid ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1865106 packages: main: linux-fips meta: linux-meta-fips signed: linux-signed-fips - phase: Ready for Packaging - phase-changed: Friday, 28. February 2020 18:31 UTC + phase: Packaging + phase-changed: Tuesday, 03. March 2020 02:46 UTC reason: - prepare-package: Pending -- version not specified + prepare-package: Pending -- package not yet uploaded + prepare-package-meta: Pending -- package not yet uploaded + prepare-package-signed: Pending -- package not yet uploaded replaces: bug 1863331 variant: debs -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1865199 Title: xenial/linux-fips: 4.4.0-1031.36 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow prepare-package-signed series: In Progress Status in Kernel SRU Workflow promote-signing-to-proposed series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: Invalid Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1865106 packages: main: linux-fips meta: linux-meta-fips signed: linux-signed-fips phase: Packaging phase-changed: Tuesday, 03. March 2020 02:46 UTC reason: prepare-package: Pending -- package not yet uploaded prepare-package-meta: Pending -- package not yet uploaded prepare-package-signed: Pending -- package not yet uploaded replaces: bug 1863331 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1865199/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1865198] Re: xenial/linux-azure: 4.15.0-1074.79 -proposed tracker
** Changed in: kernel-sru-workflow/automated-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-proposed Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/regression-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/security-signoff Status: New => Confirmed ** Changed in: kernel-sru-workflow/stakeholder-signoff Status: New => Confirmed ** Changed in: kernel-sru-workflow/verification-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/automated-testing Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/regression-testing Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/verification-testing Status: Confirmed => In Progress ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1865109 packages: main: linux-azure meta: linux-meta-azure signed: linux-signed-azure - phase: Promote to Proposed - phase-changed: Monday, 02. March 2020 17:01 UTC + phase: Testing + phase-changed: Tuesday, 03. March 2020 00:36 UTC + proposed-announcement-sent: true + proposed-testing-requested: true reason: - promote-to-proposed: Ongoing -- packages waiting in -proposed for - mirror sync + automated-testing: Ongoing -- testing in progress + regression-testing: Ongoing -- testing in progress + security-signoff: Pending -- waiting for signoff + stakeholder-signoff: Pending -- waiting for signoff + verification-testing: Ongoing -- testing in progress trackers: trusty/linux-azure: bug 1865197 xenial/linux-azure/azure-kernel: bug 1865196 variant: debs -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1865198 Title: xenial/linux-azure: 4.15.0-1074.79 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: In Progress Status in Kernel SRU Workflow security-signoff series: Confirmed Status in Kernel SRU Workflow stakeholder-signoff series: Confirmed Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-azure package in Ubuntu: Invalid Status in linux-azure source package in Xenial: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1865109 packages: main: linux-azure meta: linux-meta-azure signed: linux-signed-azure phase: Testing phase-changed: Tuesday, 03. March 2020 00:36 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: automated-testing: Ongoing -- testing in progress regression-testing: Ongoing -- testing in progress security-signoff: Pending -- waiting for signoff stakeholder-signoff: Pending -- waiting for signoff verification-testing: Ongoing -- testing in progress trackers: trusty/linux-azure: bug 1865197 xenial/linux-azure/azure-kernel: bug 1865196 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1865198/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1865251] Re: xenial/linux-gcp: 4.15.0-1058.62 -proposed tracker
** Changed in: kernel-sru-workflow/automated-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-proposed Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/regression-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/security-signoff Status: New => Confirmed ** Changed in: kernel-sru-workflow/verification-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/automated-testing Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/regression-testing Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/verification-testing Status: Confirmed => In Progress ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1865109 packages: main: linux-gcp meta: linux-meta-gcp signed: linux-signed-gcp - phase: Promote to Proposed - phase-changed: Monday, 02. March 2020 10:21 UTC + phase: Testing + phase-changed: Monday, 02. March 2020 17:56 UTC + proposed-announcement-sent: true + proposed-testing-requested: true reason: - promote-to-proposed: Ongoing -- packages waiting in -proposed for - mirror sync + automated-testing: Ongoing -- testing in progress + regression-testing: Ongoing -- testing in progress + security-signoff: Pending -- waiting for signoff + verification-testing: Ongoing -- testing in progress trackers: xenial/linux-gcp/gcp-kernel: bug 1865249 xenial/linux-gcp/gke-kernel: bug 1865250 variant: debs -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1865251 Title: xenial/linux-gcp: 4.15.0-1058.62 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: In Progress Status in Kernel SRU Workflow security-signoff series: Confirmed Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-gcp package in Ubuntu: Invalid Status in linux-gcp source package in Xenial: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1865109 packages: main: linux-gcp meta: linux-meta-gcp signed: linux-signed-gcp phase: Testing phase-changed: Monday, 02. March 2020 17:56 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: automated-testing: Ongoing -- testing in progress regression-testing: Ongoing -- testing in progress security-signoff: Pending -- waiting for signoff verification-testing: Ongoing -- testing in progress trackers: xenial/linux-gcp/gcp-kernel: bug 1865249 xenial/linux-gcp/gke-kernel: bug 1865250 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1865251/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1864707] Re: arbitrary command execution vulnerability
Released 6.0.3p1-6ubuntu0.2 for eoan ** Changed in: opensmtpd (Ubuntu Eoan) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1864707 Title: arbitrary command execution vulnerability Status in opensmtpd package in Ubuntu: Confirmed Status in opensmtpd source package in Xenial: Confirmed Status in opensmtpd source package in Bionic: Fix Released Status in opensmtpd source package in Eoan: Fix Released Status in opensmtpd package in Debian: Unknown Bug description: OpenBSD 6.6 errata 021, February 24, 2020: An out of bounds read in smtpd allows an attacker to inject arbitrary commands into the envelope file which are then executed as root. Separately, missing privilege revocation in smtpctl allows arbitrary commands to be run with the _smtpq group. This affects Debian versions since 5.7.3p2 (released upstream 2016-02-02). In particular, every Ubuntu release since xenial is affected. Quoting from the advisory: This vulnerability, an out-of-bounds read introduced in December 2015 (commit 80c6a60c, "when peer outputs a multi-line response ..."), is exploitable remotely and leads to the execution of arbitrary shell commands: either as root, after May 2018 (commit a8e22235, "switch smtpd to new grammar"); or as any non-root user, before May 2018. https://www.openwall.com/lists/oss-security/2020/02/24/5 The other advisory fixed by the patches does not appear to affect Debian because /proc/sys/fs/protected_hardlinks is 1 by default: https://www.openwall.com/lists/oss-security/2020/02/24/4 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/opensmtpd/+bug/1864707/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1864707] Re: arbitrary command execution vulnerability
Released 6.0.3p1-1ubuntu0.2 for bionic. ** Changed in: opensmtpd (Ubuntu Bionic) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1864707 Title: arbitrary command execution vulnerability Status in opensmtpd package in Ubuntu: Confirmed Status in opensmtpd source package in Xenial: Confirmed Status in opensmtpd source package in Bionic: Fix Released Status in opensmtpd source package in Eoan: Fix Released Status in opensmtpd package in Debian: Unknown Bug description: OpenBSD 6.6 errata 021, February 24, 2020: An out of bounds read in smtpd allows an attacker to inject arbitrary commands into the envelope file which are then executed as root. Separately, missing privilege revocation in smtpctl allows arbitrary commands to be run with the _smtpq group. This affects Debian versions since 5.7.3p2 (released upstream 2016-02-02). In particular, every Ubuntu release since xenial is affected. Quoting from the advisory: This vulnerability, an out-of-bounds read introduced in December 2015 (commit 80c6a60c, "when peer outputs a multi-line response ..."), is exploitable remotely and leads to the execution of arbitrary shell commands: either as root, after May 2018 (commit a8e22235, "switch smtpd to new grammar"); or as any non-root user, before May 2018. https://www.openwall.com/lists/oss-security/2020/02/24/5 The other advisory fixed by the patches does not appear to affect Debian because /proc/sys/fs/protected_hardlinks is 1 by default: https://www.openwall.com/lists/oss-security/2020/02/24/4 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/opensmtpd/+bug/1864707/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1862830] Re: Update sosreport to 3.9
This bug was fixed in the package sosreport - 3.9-1ubuntu0.18.04.1 --- sosreport (3.9-1ubuntu0.18.04.1) bionic; urgency=medium * New 3.9 upstream release (LP: #1862830) - Improved human-readable archive naming and support for archive labels - Improved reporting of archive output and properties - Support for automatic uploading of report archives via FTP and HTTPS - Automatic PATH support on Ubuntu distributions - Improved policy performance - Improved service status collection API - 9 new plugins: cloud_init, convert2rhel, ebpf, fwupd, login, nginx, nvidia, openstack_tripleo - 6 obsolete plugins removed or merged into other plugins: katello, last, mrggrid, mrgmessg, satellite - Significant updates to 14 plugins: dlm, dnf, ceph, foreman, gluster, gnocchi, juju, kubernetes, logs, maas, networking, openvswitch, python, plugins - The openswan plugin was renamed to libreswan to reflect the active upstream project name - Updated Red Hat presets and new Cloud Forms preset - Updates to networking plugin namespace handling - Updates to the OVN plugins (ovn_central, ovn_host) - Kernel eBPF data consolidated in a single plugin Further release information and tarballs are available at: https://github.com/sosreport/sos/releases/tag/3.9 * Other specific modifications: - d/p/0001-unittest-py3-fix.patch -- Eric Desrochers Thu, 20 Feb 2020 20:53:25 + ** Changed in: sosreport (Ubuntu Bionic) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1862830 Title: Update sosreport to 3.9 Status in sosreport package in Ubuntu: Fix Released Status in sosreport source package in Xenial: In Progress Status in sosreport source package in Bionic: Fix Released Status in sosreport source package in Eoan: Fix Released Status in sosreport source package in Focal: Fix Released Status in sosreport package in Debian: Fix Released Bug description: [Impact] sosreport 3.9 is now released. It would be great to find sosreport v3.9 in supported stable releases, and active development release considering the fact that the releasea (especially LTSes) are going to be supported for a couple of years still. Sosreport is widely use by Canonical support team to troubleshoot UA (Ubuntu Advantage) customer, other vendors and community users. Just like we did for : - v3.5 (LP: #1734983) - v3.6 (LP: #1775195) [Test Case] * Install sosreport * Test the new upload functionality and check if the archive is found in BrickFTP under uploads/ as it should. (e.g. sosreport -a --all-logs --upload) * Test new --all-logs behaviour * Make sure the new naming pattern doesn't break any current Canonical mechanism (Brickftp scripts, ...). If yes evaluate if easy fixable before considering reverting back to 'legacy' pattern. * Run sosreport in different customer scenarios: server, desktop, cloud, hypervisor, instance (container, vm), physical server, ... * Extract archive and look at the content, look for 0 size file (and use common sense if legit or not) * Look under "sos_reports" for full report. * Look under "sos_logs" for warnings/errors. $ grep -v "INFO:" sos_logs/sos.log * Run "simple.sh": A quick port of the travis tests to bash. Generating various type of sosreports collection. [Regression Potential] Sosreport has 292 plugins that are all configured differently and configured to run under certains conditions. We can't test all possible scenarios. All we can do is idenfity the most common, important and Ubuntu/Canonical related one and test them (e.g. Openstack*, juju, MAAS, kernel, ...) . With that being said, it is definitely possible that certains plugins may not work as expected, but the risk will be very low (e.g not collecting the desired informations) and isolated to this specific plugin. It shouldn't affect the other plugins nor core functionnalities of sosreport. [Other Informations] * Release note: https://github.com/sosreport/sos/releases/tag/3.9 [Original Description] A new version of sosreport upstream (v3.9) will be released soon. This bug is to track activities to update sosreport in Ubuntu stable + Active Devel release. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1862830/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1865243] Re: xenial/linux-kvm: 4.4.0-1068.75 -proposed tracker
** Changed in: kernel-sru-workflow/automated-testing Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1865106 packages: main: linux-kvm meta: linux-meta-kvm phase: Testing phase-changed: Monday, 02. March 2020 08:41 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: - automated-testing: Ongoing -- testing in progress regression-testing: Ongoing -- testing in progress security-signoff: Pending -- waiting for signoff verification-testing: Ongoing -- testing in progress variant: debs -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1865243 Title: xenial/linux-kvm: 4.4.0-1068.75 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: In Progress Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-kvm package in Ubuntu: Invalid Status in linux-kvm source package in Xenial: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1865106 packages: main: linux-kvm meta: linux-meta-kvm phase: Testing phase-changed: Monday, 02. March 2020 08:41 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: regression-testing: Ongoing -- testing in progress security-signoff: Pending -- waiting for signoff verification-testing: Ongoing -- testing in progress variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1865243/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1865495] [NEW] linux-deeplens: -proposed tracker
Public bug reported: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1865142 replaces: bug 1864751 variant: debs ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Invalid ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Invalid ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Xenial) Importance: Medium Status: Invalid ** Tags: kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-cycle-2020.02.17-3 kernel-sru-derivative-of-1865142 xenial ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Tags added: kernel-release-tracking-bug xenial ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Xenial) Status: New => Invalid ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/automated-testing Status: New => Invalid ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/promote-to-proposed Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/promote-to-proposed Assignee: (unassigned) => Ubuntu Stable Release Updates Team (ubuntu-sru) ** Changed in: kernel-sru-workflow/promote-to-security Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/promote-to-security Assignee: (unassigned) => Ubuntu Stable Release Updates Team (ubuntu-sru) ** Changed i
[Group.of.nepali.translators] [Bug 1865479] [NEW] xenial/linux-oracle: -proposed tracker
Public bug reported: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1865480 packages: main: linux-oracle meta: linux-meta-oracle signed: linux-signed-oracle phase: Holding before Packaging phase-changed: Monday, 02. March 2020 12:44 UTC reason: prepare-package: Holding -- waiting for master bug variant: debs ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: Invalid ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux-oracle (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux-oracle (Ubuntu Xenial) Importance: Medium Status: Confirmed ** Tags: kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-backport-of-1865480 kernel-sru-cycle-2020.02.17-3 xenial ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Tags added: kernel-release-tracking-bug xenial ** Also affects: linux-oracle (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux-oracle (Ubuntu Xenial) Status: New => Confirmed ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/certification-testing Status: New => Invalid ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) => Canonica
[Group.of.nepali.translators] [Bug 1862154] Re: Syslog spammed with "domain is utf8 flagged"
This bug was fixed in the package spamassassin - 3.4.2-0ubuntu0.16.04.4 --- spamassassin (3.4.2-0ubuntu0.16.04.4) xenial; urgency=medium * d/p/lp-1862154-*: avoid 'domain is utf8 flagged' flooding the logs (LP: #1862154) -- Christian Ehrhardt Mon, 10 Feb 2020 16:17:02 +0100 ** Changed in: spamassassin (Ubuntu Xenial) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1862154 Title: Syslog spammed with "domain is utf8 flagged" Status in spamassassin package in Ubuntu: Fix Released Status in spamassassin source package in Xenial: Fix Released Status in spamassassin source package in Bionic: Fix Released Status in spamassassin source package in Eoan: Fix Released Bug description: [Impact] * An issue fixed upstream in later releases can cause issues with UTF emails * backport the upstream fix to stable supported releases to avoid log flooding with related error messages. [Test Case] * using a test mail attached on this bug: $ apt install spamassassin $ systemctl start spamassassin $ wget https://bugs.launchpad.net/ubuntu/+source/spamassassin/+bug/1862154/+attachment/5326196/+files/bug1862154.eml $ spamc -R < bug1862154.eml $ grep "domain is utf8 flagged" /var/log/mail.log If still affected this will add some lines to the log, otherwise it won't. [Regression Potential] * The change is fortunately minimal (one line) and only changes the output severity to not pop up in the logs. The one risk I can think of is people expecting this output, but I can't think of a useful real case for this. [Other Info] * n/a --- Seems that https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7632 has been re-introduced. # lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 18.04.3 LTS Release: 18.04 Codename: bionic # apt-cache policy spamassassin spamassassin: Installed: 3.4.2-0ubuntu0.18.04.3 Candidate: 3.4.2-0ubuntu0.18.04.3 I am seeing *lots* of info logs for every email: Feb 6 07:30:26 spam02a spamd[11370]: dns: new_dns_packet: domain is utf8 flagged: grace.ns.cloudflare.com Feb 6 07:30:26 spam02a spamd[11370]: dns: new_dns_packet: domain is utf8 flagged: sid.ns.cloudflare.com Feb 6 07:30:26 spam02a spamd[11370]: dns: new_dns_packet: domain is utf8 flagged: ns1.silverpop.com SpamAssassin/DnsResolver.pm - Line 549 ---8<--- if (utf8::is_utf8($domain)) { # since Perl 5.8.1 info("dns: new_dns_packet: domain is utf8 flagged: %s", $domain); } ---8<--- This should be a dbg flag - this is fixed in Spamassassin 3.4.4 upstream - could we have a backport for this current version of 3.4.2? To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/spamassassin/+bug/1862154/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1863232] Re: daemon rotates socket on restart
This bug was fixed in the package mod-wsgi - 4.3.0-1.1ubuntu1 --- mod-wsgi (4.3.0-1.1ubuntu1) xenial; urgency=medium * d/p/allow-disabling-daemon-socket-rotation-on-restart.patch: Add option for disabling daemon socket rotation on restarts (LP: #1863232) -- Dariusz Gadomski Fri, 14 Feb 2020 12:36:00 +0100 ** Changed in: mod-wsgi (Ubuntu Xenial) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1863232 Title: daemon rotates socket on restart Status in mod-wsgi package in Ubuntu: Fix Released Status in mod-wsgi source package in Xenial: Fix Released Status in mod-wsgi source package in Bionic: Fix Released Bug description: [Impact] * Lack of option for disabling wsgi socket rotation leads to errors on graceful restarts, making them not as graceful. * Specifically, when mod-wsgi is running in daemon mode (which uses sockets), and a graceful restart ('sudo systemctl reload apache2') happens, the socket filename changes, and upcoming HTTP requests in a keep-alive connection (i.e., same connection is re-utilized for multiple HTTP requests) initiated before the graceful restart are failed (HTTP 503 error) because the socket file is not found. * This change introduces a new config option WSGISocketRotation that allows to disable the rotation. * The option is disabled by default, so the default behavior remains consistent with the previous versions (ie, socket rotation occurs.) * This is actually desired, and designed that way by upstream, because disabling socket rotation requires no _wsgi_ config changes, as they can impact/alter the upcoming HTTP requests (see patch link.) [Test Case] * Setup apache2 with mod-wsgi. * Make sure there are some wsgi sockets open. * Reload apache gracefully. * (Detailed steps are provided in comments #9 and #10) Expected result: No errors related to sockets in the logs Actual result: There are error messages related to sockets in the logs. [Regression Potential] * Since the value is set to On by default any regressions would manifest only after explicitly setting it to Off. * After it's set to off WSGI application behavior will change on reloads - connections should be resumed instead of cancelled. [Other Info] * The fix has been introduced in mod-wsgi 4.6.0, thus already present in Disco/Eoan/Focal, only needed in Xenial/Bionic. * Original bug description: On Apache reloads the WSGI daemon tries to rotate wsgi sockets causing unnecessary log entries, especially in OpenStack context. This has been addressed in mod-wsgi upstream (4.6.0) and could be backported to Ubuntu. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1863232/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1865245] Re: xenial/linux-aws: 4.4.0-1104.115 -proposed tracker
** Changed in: kernel-sru-workflow/automated-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-proposed Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/regression-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/security-signoff Status: New => Confirmed ** Changed in: kernel-sru-workflow/verification-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/automated-testing Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/regression-testing Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/verification-testing Status: Confirmed => In Progress ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1865106 packages: main: linux-aws meta: linux-meta-aws - phase: Promote to Proposed - phase-changed: Monday, 02. March 2020 08:41 UTC + phase: Testing + phase-changed: Monday, 02. March 2020 10:32 UTC + proposed-announcement-sent: true + proposed-testing-requested: true reason: - promote-to-proposed: Ongoing -- packages waiting in -proposed for - mirror sync + automated-testing: Ongoing -- testing in progress + regression-testing: Ongoing -- testing in progress + security-signoff: Pending -- waiting for signoff + verification-testing: Ongoing -- testing in progress trackers: xenial/linux-aws/aws-kernel: bug 1865244 variant: debs -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1865245 Title: xenial/linux-aws: 4.4.0-1104.115 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: In Progress Status in Kernel SRU Workflow security-signoff series: Confirmed Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-aws package in Ubuntu: Invalid Status in linux-aws source package in Xenial: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1865106 packages: main: linux-aws meta: linux-meta-aws phase: Testing phase-changed: Monday, 02. March 2020 10:32 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: automated-testing: Ongoing -- testing in progress regression-testing: Ongoing -- testing in progress security-signoff: Pending -- waiting for signoff verification-testing: Ongoing -- testing in progress trackers: xenial/linux-aws/aws-kernel: bug 1865244 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1865245/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1863232] Re: daemon rotates socket on restart
This bug was fixed in the package mod-wsgi - 4.5.17-1ubuntu1 --- mod-wsgi (4.5.17-1ubuntu1) bionic; urgency=medium * d/p/allow-disabling-daemon-socket-rotation-on-restart.patch: Add option for disabling daemon socket rotation on restarts (LP: #1863232) -- Dariusz Gadomski Fri, 14 Feb 2020 12:08:41 +0100 ** Changed in: mod-wsgi (Ubuntu Bionic) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1863232 Title: daemon rotates socket on restart Status in mod-wsgi package in Ubuntu: Fix Released Status in mod-wsgi source package in Xenial: Fix Committed Status in mod-wsgi source package in Bionic: Fix Released Bug description: [Impact] * Lack of option for disabling wsgi socket rotation leads to errors on graceful restarts, making them not as graceful. * Specifically, when mod-wsgi is running in daemon mode (which uses sockets), and a graceful restart ('sudo systemctl reload apache2') happens, the socket filename changes, and upcoming HTTP requests in a keep-alive connection (i.e., same connection is re-utilized for multiple HTTP requests) initiated before the graceful restart are failed (HTTP 503 error) because the socket file is not found. * This change introduces a new config option WSGISocketRotation that allows to disable the rotation. * The option is disabled by default, so the default behavior remains consistent with the previous versions (ie, socket rotation occurs.) * This is actually desired, and designed that way by upstream, because disabling socket rotation requires no _wsgi_ config changes, as they can impact/alter the upcoming HTTP requests (see patch link.) [Test Case] * Setup apache2 with mod-wsgi. * Make sure there are some wsgi sockets open. * Reload apache gracefully. * (Detailed steps are provided in comments #9 and #10) Expected result: No errors related to sockets in the logs Actual result: There are error messages related to sockets in the logs. [Regression Potential] * Since the value is set to On by default any regressions would manifest only after explicitly setting it to Off. * After it's set to off WSGI application behavior will change on reloads - connections should be resumed instead of cancelled. [Other Info] * The fix has been introduced in mod-wsgi 4.6.0, thus already present in Disco/Eoan/Focal, only needed in Xenial/Bionic. * Original bug description: On Apache reloads the WSGI daemon tries to rotate wsgi sockets causing unnecessary log entries, especially in OpenStack context. This has been addressed in mod-wsgi upstream (4.6.0) and could be backported to Ubuntu. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1863232/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1862154] Re: Syslog spammed with "domain is utf8 flagged"
This bug was fixed in the package spamassassin - 3.4.2-0ubuntu0.18.04.4 --- spamassassin (3.4.2-0ubuntu0.18.04.4) bionic; urgency=medium * d/p/lp-1862154-*: avoid 'domain is utf8 flagged' flooding the logs (LP: #1862154) -- Christian Ehrhardt Mon, 10 Feb 2020 16:17:02 +0100 ** Changed in: spamassassin (Ubuntu Bionic) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1862154 Title: Syslog spammed with "domain is utf8 flagged" Status in spamassassin package in Ubuntu: Fix Released Status in spamassassin source package in Xenial: Fix Committed Status in spamassassin source package in Bionic: Fix Released Status in spamassassin source package in Eoan: Fix Released Bug description: [Impact] * An issue fixed upstream in later releases can cause issues with UTF emails * backport the upstream fix to stable supported releases to avoid log flooding with related error messages. [Test Case] * using a test mail attached on this bug: $ apt install spamassassin $ systemctl start spamassassin $ wget https://bugs.launchpad.net/ubuntu/+source/spamassassin/+bug/1862154/+attachment/5326196/+files/bug1862154.eml $ spamc -R < bug1862154.eml $ grep "domain is utf8 flagged" /var/log/mail.log If still affected this will add some lines to the log, otherwise it won't. [Regression Potential] * The change is fortunately minimal (one line) and only changes the output severity to not pop up in the logs. The one risk I can think of is people expecting this output, but I can't think of a useful real case for this. [Other Info] * n/a --- Seems that https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7632 has been re-introduced. # lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 18.04.3 LTS Release: 18.04 Codename: bionic # apt-cache policy spamassassin spamassassin: Installed: 3.4.2-0ubuntu0.18.04.3 Candidate: 3.4.2-0ubuntu0.18.04.3 I am seeing *lots* of info logs for every email: Feb 6 07:30:26 spam02a spamd[11370]: dns: new_dns_packet: domain is utf8 flagged: grace.ns.cloudflare.com Feb 6 07:30:26 spam02a spamd[11370]: dns: new_dns_packet: domain is utf8 flagged: sid.ns.cloudflare.com Feb 6 07:30:26 spam02a spamd[11370]: dns: new_dns_packet: domain is utf8 flagged: ns1.silverpop.com SpamAssassin/DnsResolver.pm - Line 549 ---8<--- if (utf8::is_utf8($domain)) { # since Perl 5.8.1 info("dns: new_dns_packet: domain is utf8 flagged: %s", $domain); } ---8<--- This should be a dbg flag - this is fixed in Spamassassin 3.4.4 upstream - could we have a backport for this current version of 3.4.2? To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/spamassassin/+bug/1862154/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1862154] Re: Syslog spammed with "domain is utf8 flagged"
This bug was fixed in the package spamassassin - 3.4.2-1ubuntu0.19.10.3 --- spamassassin (3.4.2-1ubuntu0.19.10.3) eoan; urgency=medium * d/p/lp-1862154-*: avoid 'domain is utf8 flagged' flooding the logs (LP: #1862154) -- Christian Ehrhardt Mon, 10 Feb 2020 16:17:02 +0100 ** Changed in: spamassassin (Ubuntu Eoan) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1862154 Title: Syslog spammed with "domain is utf8 flagged" Status in spamassassin package in Ubuntu: Fix Released Status in spamassassin source package in Xenial: Fix Committed Status in spamassassin source package in Bionic: Fix Released Status in spamassassin source package in Eoan: Fix Released Bug description: [Impact] * An issue fixed upstream in later releases can cause issues with UTF emails * backport the upstream fix to stable supported releases to avoid log flooding with related error messages. [Test Case] * using a test mail attached on this bug: $ apt install spamassassin $ systemctl start spamassassin $ wget https://bugs.launchpad.net/ubuntu/+source/spamassassin/+bug/1862154/+attachment/5326196/+files/bug1862154.eml $ spamc -R < bug1862154.eml $ grep "domain is utf8 flagged" /var/log/mail.log If still affected this will add some lines to the log, otherwise it won't. [Regression Potential] * The change is fortunately minimal (one line) and only changes the output severity to not pop up in the logs. The one risk I can think of is people expecting this output, but I can't think of a useful real case for this. [Other Info] * n/a --- Seems that https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7632 has been re-introduced. # lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 18.04.3 LTS Release: 18.04 Codename: bionic # apt-cache policy spamassassin spamassassin: Installed: 3.4.2-0ubuntu0.18.04.3 Candidate: 3.4.2-0ubuntu0.18.04.3 I am seeing *lots* of info logs for every email: Feb 6 07:30:26 spam02a spamd[11370]: dns: new_dns_packet: domain is utf8 flagged: grace.ns.cloudflare.com Feb 6 07:30:26 spam02a spamd[11370]: dns: new_dns_packet: domain is utf8 flagged: sid.ns.cloudflare.com Feb 6 07:30:26 spam02a spamd[11370]: dns: new_dns_packet: domain is utf8 flagged: ns1.silverpop.com SpamAssassin/DnsResolver.pm - Line 549 ---8<--- if (utf8::is_utf8($domain)) { # since Perl 5.8.1 info("dns: new_dns_packet: domain is utf8 flagged: %s", $domain); } ---8<--- This should be a dbg flag - this is fixed in Spamassassin 3.4.4 upstream - could we have a backport for this current version of 3.4.2? To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/spamassassin/+bug/1862154/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1863314] Re: xenial/linux-cascade: 4.4.0-1015.17 -proposed tracker
** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- - kernel-stable-master-bug: 1863338 + kernel-stable-master-bug: 1865106 packages: main: linux-cascade meta: linux-meta-cascade signed: linux-signed-cascade phase: Ready for Packaging phase-changed: Saturday, 15. February 2020 05:08 UTC reason: prepare-package: Pending -- version not specified trackers: xenial/linux-cascade/cascade-kernel: bug 1863313 variant: debs ** Changed in: kernel-sru-workflow/promote-to-security Status: New => Invalid ** Changed in: kernel-sru-workflow/security-signoff Status: New => Invalid ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1865106 packages: main: linux-cascade meta: linux-meta-cascade signed: linux-signed-cascade - phase: Ready for Packaging - phase-changed: Saturday, 15. February 2020 05:08 UTC + phase: Packaging + phase-changed: Monday, 02. March 2020 09:35 UTC reason: - prepare-package: Pending -- version not specified + prepare-package: Pending -- package not yet uploaded + prepare-package-meta: Pending -- package not yet uploaded + prepare-package-signed: Pending -- package not yet uploaded trackers: xenial/linux-cascade/cascade-kernel: bug 1863313 variant: debs -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1863314 Title: xenial/linux-cascade: 4.4.0-1015.17 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow prepare-package-signed series: In Progress Status in Kernel SRU Workflow promote-signing-to-proposed series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Invalid Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: Invalid Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1865106 packages: main: linux-cascade meta: linux-meta-cascade signed: linux-signed-cascade phase: Packaging phase-changed: Monday, 02. March 2020 09:35 UTC reason: prepare-package: Pending -- package not yet uploaded prepare-package-meta: Pending -- package not yet uploaded prepare-package-signed: Pending -- package not yet uploaded trackers: xenial/linux-cascade/cascade-kernel: bug 1863313 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1863314/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1854237] Re: autopkgtests fail after security fixes
This bug was fixed in the package apport - 2.20.11-0ubuntu8.5 --- apport (2.20.11-0ubuntu8.5) eoan; urgency=medium * data/whoopsie-upload-all: append to the crash report using fdopen and open from os to cope with protected_regular being set to 1. (LP: #1848064) [ Michael Hudson-Doyle ] * Fix autopkgtest failures since recent security update: (LP: #1854237) - Fix regression in creating report for crashing setuid process by getting kernel to tell us the executable path rather than reading /proc/[pid]/exe. - Fix deletion of partially written core files. - Fix test_get_logind_session to use new API. - Restore add_proc_info raising ValueError for a dead process. - Delete test_lock_symlink, no longer applicable now that the lock is created in a directory only root can write to. -- Brian Murray Mon, 24 Feb 2020 09:38:55 -0800 ** Changed in: apport (Ubuntu Eoan) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1854237 Title: autopkgtests fail after security fixes Status in Apport: New Status in apport package in Ubuntu: Fix Released Status in apport source package in Xenial: New Status in apport source package in Bionic: New Status in apport source package in Disco: New Status in apport source package in Eoan: Fix Released Bug description: The following autopkgtests fail after the recent security fixes: log:FAIL: test_get_logind_session (__main__.T) log:FAIL: test_core_dump_packaged (__main__.T) log:FAIL: test_core_dump_unpackaged (__main__.T) log:FAIL: test_crash_setuid_drop (__main__.T) log:FAIL: test_crash_setuid_keep (__main__.T) log:FAIL: test_crash_setuid_nonwritable_cwd (__main__.T) log:FAIL: test_lock_symlink (__main__.T) test_get_logind_session is a test failing to keep up with an API change. test_core_dump_* is failures to remove partly written core files. Both of these are easy fixes, I'll have a MP for them soon. test_crash_setuid_* are caused by the dropping of privileges when accessing the crashing process's /proc. They seem to be testing behaviour now explicitly forbidden by the fix to be honest! test_lock_symlink fails because the lock file is now always in /var/lock/apport/ and not in $APPORT_REPORT_DIR. I guess we could update the test, but is it really worth it after the fix? To manage notifications about this bug go to: https://bugs.launchpad.net/apport/+bug/1854237/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1863347] Re: xenial/linux-gcp: 4.15.0-1056.60 -proposed tracker
*** This bug is a duplicate of bug 1865251 *** https://bugs.launchpad.net/bugs/1865251 ** This bug is no longer a duplicate of bug 1864748 xenial/linux-gcp: 4.15.0-1057.61 -proposed tracker ** This bug has been marked a duplicate of bug 1865251 xenial/linux-gcp: 4.15.0-1058.62 -proposed tracker -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1863347 Title: xenial/linux-gcp: 4.15.0-1056.60 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-gcp package in Ubuntu: Invalid Status in linux-gcp source package in Xenial: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1864753 packages: main: linux-gcp meta: linux-meta-gcp signed: linux-signed-gcp phase: Testing phase-changed: Thursday, 20. February 2020 23:02 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: security-signoff: Stalled -- waiting for signoff verification-testing: Ongoing -- testing in progress trackers: xenial/linux-gcp/gcp-kernel: bug 1863345 xenial/linux-gcp/gke-kernel: bug 1863346 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1863347/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1865243] Re: xenial/linux-kvm: 4.4.0-1068.75 -proposed tracker
** Changed in: kernel-sru-workflow/automated-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-proposed Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/regression-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/security-signoff Status: New => Confirmed ** Changed in: kernel-sru-workflow/verification-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/automated-testing Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/regression-testing Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/verification-testing Status: Confirmed => In Progress ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1865106 packages: main: linux-kvm meta: linux-meta-kvm - phase: Promote to Proposed - phase-changed: Monday, 02. March 2020 06:21 UTC + phase: Testing + phase-changed: Monday, 02. March 2020 08:41 UTC + proposed-announcement-sent: true + proposed-testing-requested: true reason: - promote-to-proposed: Ongoing -- packages waiting in -proposed for - mirror sync + automated-testing: Ongoing -- testing in progress + regression-testing: Ongoing -- testing in progress + security-signoff: Pending -- waiting for signoff + verification-testing: Ongoing -- testing in progress variant: debs -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1865243 Title: xenial/linux-kvm: 4.4.0-1068.75 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: In Progress Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-kvm package in Ubuntu: Invalid Status in linux-kvm source package in Xenial: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1865106 packages: main: linux-kvm meta: linux-meta-kvm phase: Testing phase-changed: Monday, 02. March 2020 08:41 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: automated-testing: Ongoing -- testing in progress regression-testing: Ongoing -- testing in progress security-signoff: Pending -- waiting for signoff verification-testing: Ongoing -- testing in progress variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1865243/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1862830] Re: Update sosreport to 3.9
This bug was fixed in the package sosreport - 3.9-1ubuntu0.19.10.1 --- sosreport (3.9-1ubuntu0.19.10.1) eoan; urgency=medium * New 3.9 upstream release (LP: #1862830) - Improved human-readable archive naming and support for archive labels - Improved reporting of archive output and properties - Support for automatic uploading of report archives via FTP and HTTPS - Automatic PATH support on Ubuntu distributions - Improved policy performance - Improved service status collection API - 9 new plugins: cloud_init, convert2rhel, ebpf, fwupd, login, nginx, nvidia, openstack_tripleo - 6 obsolete plugins removed or merged into other plugins: katello, last, mrggrid, mrgmessg, satellite - Significant updates to 14 plugins: dlm, dnf, ceph, foreman, gluster, gnocchi, juju, kubernetes, logs, maas, networking, openvswitch, python, plugins - The openswan plugin was renamed to libreswan to reflect the active upstream project name - Updated Red Hat presets and new Cloud Forms preset - Updates to networking plugin namespace handling - Updates to the OVN plugins (ovn_central, ovn_host) - Kernel eBPF data consolidated in a single plugin Further release information and tarballs are available at: https://github.com/sosreport/sos/releases/tag/3.9 * Other specific modifications: - d/p/0001-unittest-py3-fix.patch -- Eric Desrochers Thu, 20 Feb 2020 20:43:21 + ** Changed in: sosreport (Ubuntu Eoan) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1862830 Title: Update sosreport to 3.9 Status in sosreport package in Ubuntu: Fix Released Status in sosreport source package in Xenial: In Progress Status in sosreport source package in Bionic: Fix Committed Status in sosreport source package in Eoan: Fix Released Status in sosreport source package in Focal: Fix Released Status in sosreport package in Debian: Fix Released Bug description: [Impact] sosreport 3.9 is now released. It would be great to find sosreport v3.9 in supported stable releases, and active development release considering the fact that the releasea (especially LTSes) are going to be supported for a couple of years still. Sosreport is widely use by Canonical support team to troubleshoot UA (Ubuntu Advantage) customer, other vendors and community users. Just like we did for : - v3.5 (LP: #1734983) - v3.6 (LP: #1775195) [Test Case] * Install sosreport * Test the new upload functionality and check if the archive is found in BrickFTP under uploads/ as it should. (e.g. sosreport -a --all-logs --upload) * Test new --all-logs behaviour * Make sure the new naming pattern doesn't break any current Canonical mechanism (Brickftp scripts, ...). If yes evaluate if easy fixable before considering reverting back to 'legacy' pattern. * Run sosreport in different customer scenarios: server, desktop, cloud, hypervisor, instance (container, vm), physical server, ... * Extract archive and look at the content, look for 0 size file (and use common sense if legit or not) * Look under "sos_reports" for full report. * Look under "sos_logs" for warnings/errors. $ grep -v "INFO:" sos_logs/sos.log * Run "simple.sh": A quick port of the travis tests to bash. Generating various type of sosreports collection. [Regression Potential] Sosreport has 292 plugins that are all configured differently and configured to run under certains conditions. We can't test all possible scenarios. All we can do is idenfity the most common, important and Ubuntu/Canonical related one and test them (e.g. Openstack*, juju, MAAS, kernel, ...) . With that being said, it is definitely possible that certains plugins may not work as expected, but the risk will be very low (e.g not collecting the desired informations) and isolated to this specific plugin. It shouldn't affect the other plugins nor core functionnalities of sosreport. [Other Informations] * Release note: https://github.com/sosreport/sos/releases/tag/3.9 [Original Description] A new version of sosreport upstream (v3.9) will be released soon. This bug is to track activities to update sosreport in Ubuntu stable + Active Devel release. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1862830/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp