Vladimir, I did this in the same location as before -
https://launchpad.net/~ci-train-ppa-service/+archive/ubuntu/4654
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1921518
1.1.1f-1ubuntu2.8 is security-only update to address CVE-2021-3711 &
CVE-2021-3712
The fixes from this bug report have been rebased on top of the security-
only update in the PPA provided earlier. It has been carrying
1.1.1f-1ubuntu2.9 since yesterday.
** CVE added: https://cve.mitre.org/cgi-bin/
Please merge 1.1.1l with the CVE fixes
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1939544
Title:
Merge the 1.1.1k version from Debian
Status in openssl package in Ubu
The updated openssl package does not change any behaviour w.r.t. config
or engine use. It only has three patches applied to prevent potential
use-after-free errors. It also relies on installing the new PKA engine
with patches from github.
Has the new PKA engine been recompiled and installed correc
@vladimir sokolovsky
Note, that the proposed PPA is built for all architectures, and all
configurations of the packages in questions as used in Ubuntu. Meaning,
they are all compiled in multiple configurations, which are mutually
incompatible. To ensure one installs the upgraded packages suitable
** Changed in: openssh (Ubuntu Bionic)
Status: Confirmed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1832356
Title:
Upgrade OpenSSH to 7.9p1-10 or b
New curl & openssl will take some time to appear in focal-updates, as
focal-updates are frozen for 20.04.3 release on 26th of August at the
moment.
See https://discourse.ubuntu.com/t/focal-fossa-20-04-3-lts-point-
release-status-tracking/22948
--
You received this bug notification because you ar
Whilst I have identified broken/racy/incomplete behaviours in both curl
and openssl in ubuntu focal 20.04 and created SRUs for them in the above
mentioned bug reports; these do not fix crashes of the old PKA 1.0.0
engine.
Also PKA 1.0.0 does not appear to be compatible with 20.04 userspace
anymore
Openssl bug report
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1940656
** Changed in: openssl (Ubuntu)
Status: New => Incomplete
** Changed in: openssl (Ubuntu Focal)
Status: New => Incomplete
** Changed in: openssl (Ubuntu Focal)
Importance: Critical => Undecided
**
** Patch added:
"lp-1940656-4-Prevent-use-after-free-of-global_engine_lock.patch"
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1940656/+attachment/5519404/+files/lp-1940656-4-Prevent-use-after-free-of-global_engine_lock.patch
--
You received this bug notification because you are a
** Patch added: "lp-1940656-3-engine-fix-double-free-on-error-path.patch"
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1940656/+attachment/5519403/+files/lp-1940656-3-engine-fix-double-free-on-error-path.patch
--
You received this bug notification because you are a member of Ubuntu
** Patch added: "lp-1940656-2-ts-fix-double-free-on-error-path.patch"
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1940656/+attachment/5519402/+files/lp-1940656-2-ts-fix-double-free-on-error-path.patch
--
You received this bug notification because you are a member of Ubuntu
Touch se
** Patch added: "lp-1940656-1-srp-fix-double-free.patch"
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1940656/+attachment/5519401/+files/lp-1940656-1-srp-fix-double-free.patch
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is su
Public bug reported:
[Impact]
* There have been multiple use-after-free bugs fixed in OpenSSL 1.1.1
stable branches which have not yet been applied in Focal. They are
difficult to reproduce, often require an engine to be used, and somehow
fail, as these use-after-free bugs are all in error condi
Building test package in https://launchpad.net/~ci-train-ppa-
service/+archive/ubuntu/4654
But also uploaded it into focal unapproved, which is currently soft
frozen.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to curl in Ub
Curl bug report
https://bugs.launchpad.net/ubuntu/+source/curl/+bug/1940528
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1921518
Title:
OpenSSL "double free" error
Stat
** Patch added: "lp1940528-openssl-use-OPENSSL_init_ssl-with-1.1.0.patch"
https://bugs.launchpad.net/ubuntu/+source/curl/+bug/1940528/+attachment/5519059/+files/lp1940528-openssl-use-OPENSSL_init_ssl-with-1.1.0.patch
--
You received this bug notification because you are a member of Ubuntu
Tou
Public bug reported:
[Impact]
* curl 7.68 does not correctly use OpenSSL 1.1.0+ api to init OpenSSL
global state prior to executing any OpenSSL APIs. This may lead to
duplicate engine initiation, which upon engine unload may cause use-
after-free or double-free of any methods that engine install
Found curl missuse of openssl api; Found missing use-after-free fixes in
openssl; in addition to the pka engine fixes that are possible.
Imho all three should be fixed.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl
Cannot reproduce the issue when using `openssl s_client -connect` or
when using `wget` so it is specific to curl + openssl + engine at the
moment.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs
It appears that engine is destroyed multiple times.
Please see https://github.com/Mellanox/pka/pull/37 which can help to
guard against that.
Meanwhile I'm continuing to research as to why engine is destroyed
multiple times.
--
You received this bug notification because you are a member of Ubunt
** Changed in: openssl (Ubuntu)
Importance: Undecided => Critical
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchp
psqlodbc confuses me, as if clusters fail to create. Seems unrelated to
openssl changes.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1928989
Title:
expiring trust ancho
inclusion of the package on the iso is one thing; it is a different
thing to build the boot initrd with microcode included. I do not believe
that d-i base installation media ever create d-i initrd with microcode
included. Thus even if package is included on the ISO it will not be
present in the d-i
python3.5 ADT regression is in xenial-updates regression, because the
test certificates it uses have expired.
** Tags removed: verification-needed verification-needed-xenial
** Tags added: verification-done verification-done-xenial
--
You received this bug notification because you are a member o
Download of canonical.com with faketime 2021-10-01 also works.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1928989
Title:
expiring trust anchor compatibility issue
Sta
ruby2.3 is not a regression on all other arches, not sure why s390x is
the only "working" arch with failing test.
retried psqlodbc
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/
Reproduced the bug with:
# dpkg-query -W libssl1.0.0 openssl
libssl1.0.0:amd64 1.0.2g-1ubuntu4.19
openssl 1.0.2g-1ubuntu4.19
# openssl s_client -connect expired-root-ca-test.germancoding.com:443
-servername expired-root-ca-test.germancoding.com -verify 1 -verifyCAfile ca.pem
verify depth i
** Patch removed: "chmod-reference.patch"
https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1938886/+attachment/5515876/+files/chmod-reference.patch
** Patch added: "chmod-reference.patch"
https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1938886/+attachment/5515888/+files/
** Patch added: "chmod-reference.patch"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1938886/+attachment/5515876/+files/chmod-reference.patch
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to bash in Ubuntu.
https://
** Changed in: bash (Ubuntu)
Status: New => Invalid
** Changed in: dash (Ubuntu)
Status: New => Invalid
** Changed in: debhelper (Ubuntu)
Status: New => Triaged
** Changed in: debugedit (Ubuntu)
Status: New => Invalid
** Changed in: linux (Ubuntu)
Status: New
Based on https://elixir.bootlin.com/linux/latest/source/fs/inode.c#L1928
it seems that setuid and capabilities will be stipped, thus currently
our implementation of dh_strip causes to loose setuid and capabilities.
No idea why this is working with fakeroot when Rules-Requires-Root is set to
bina
Public bug reported:
gnutls library can be configured using /etc/gnutls/config for example to
allow small keys and TLS versions below v1.2
however, if application is confined and has an apparmor profile and uses
gnutls it will ignore such file, if it is not allowed to read it.
For example:
[ 3
separately I'm not sure who/what/why stips setuid bits on file creation
through redirect.
is it like some kind of a CVE in bash/dash? kernel protection?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to bash in Ubuntu.
https://
- objcopy/strip changed in 2.36.1, not keeping file attributes of the
original file. Work around that in dh_strip to write to a temporary
file and cat'ing this to the original file to keep the original
attributes.
which is broken for setuid files.
** Also affects: dash (Ubuntu)
dh_strip does
strip --remove-section=.comment --remove-section=.note --strip-unneeded -o
/tmp/OdGxqpWWsW/stripeIrB_j debian/virtualbox/usr/lib/virtualbox/VBoxSDL.so
cat '/tmp/OdGxqpWWsW/stripeIrB_j' >
'debian/virtualbox/usr/lib/virtualbox/VBoxSDL.so'
which behaves differently under root and non
With debugedit v5.0 things are still the same
https://launchpadlibrarian.net/551609214/buildlog_ubuntu-impish-
amd64.virtualbox_6.1.26-dfsg-2ubuntu1_BUILDING.txt.gz
the setuid bit is lost.
I guess we need to dig deeper into dh_strip activities, to see
what/where/how it is lost. Maybe it is lost
ls -latr debian/virtualbox/usr/lib/virtualbox/VBoxSDL
-rwsr-sr-x 1 buildd buildd 406824 Aug 4 15:51
debian/virtualbox/usr/lib/virtualbox/VBoxSDL
dh_strip --dbgsym-migration='virtualbox-dbg'
ls -latr debian/virtualbox/usr/lib/virtualbox/VBoxSDL
-rwxr-xr-x 1 buildd buildd 166208 Aug 4 15:52
deb
Public bug reported:
Over at https://launchpadlibrarian.net/550715513/buildlog_ubuntu-
hirsute-amd64.virtualbox_6.1.22-dfsg-2~ubuntu1.21.04.2_BUILDING.txt.gz
I have rebuilt an earlier version of virtualbox, that sets Rules-
Requires-Root: no and added extra ls statements to find where/when/why
se
But the things mentioned in systemd issue were supposedly resolved, and
https://github.com/systemd/systemd/commit/d84af414180a4a8a7dd8772fc9d5302b5f9f28c9
is in focal already.. so is there something else not working in
focal?
--
You received this bug notification because you are a member of U
I am quite surprised by this behaviour.
Especially since, `quilt push -a; debuild -S` works find, unpacks fine,
applies fine etc.
Quite a weird limitation imho. Do you think this warrants an upstream
dpkg bug report?
--
You received this bug notification because you are a member of Ubuntu
Touch
i.e. basic.target is too much there.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dbus in Ubuntu.
https://bugs.launchpad.net/bugs/1936948
Title:
Dependency loop via sockets.target
Status in dbus package in Ubuntu:
New
What the patch was supposed to do is to list
Default Dependencies from
https://www.freedesktop.org/software/systemd/man/systemd.socket.html#
But drop/negate shutdown related ones.
Thus it should have been
1) Before= dependency on sockets.target
2) After= and Wants= dependency on sysinit.target
** Changed in: heimdal (Ubuntu)
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to heimdal in Ubuntu.
https://bugs.launchpad.net/bugs/1934936
Title:
package libwind0-heimdal 7.7.0+dfsg-2
In i386 build log I see
Searching for duplicated docs in dependency libroken18-heimdal...
symlinking changelog.Debian.gz in libwind0-heimdal to file in
libroken18-heimdal
I don't see something similar in adm64.
As if the trimming of the changelog entries got done before doing
symlinks, instea
Is this debhelper or binary-package-mangler bug then?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to heimdal in Ubuntu.
https://bugs.launchpad.net/bugs/1934936
Title:
package libwind0-heimdal 7.7.0+dfsg-2build1 failed to i
sshd_config is user modifyable and maintained. Some options can be
changed using dpkg-reconfigure openssh-server but otherwise changes to
it should be preserved.
Can you please provide steps to reproduce changes to sshd_config getting
lost?
--
You received this bug notification because you are a
/boot/grub/grub.cfg is a generated file that must not be modified by
hand. Instead one is supposed to modify things like /etc/default/grub
/etc/default/grub.d/* /etc/grub.d/*
** Changed in: grub2 (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a membe
(bionic-amd64)root@ottawa:/tmp# dpkg-query -W initramfs-tools liblz4-tool zstd
initramfs-tools 0.130ubuntu3.13
liblz4-tool 0.0~r131-2ubuntu3.1
zstd1.3.3+dfsg-2ubuntu1.2
(bionic-amd64)root@ottawa:/tmp# mkinitramfs -c zstd -o zstd-initrd.img
4.15.0-150-generic
(bionic-amd64)root@ottawa:/tmp
** Description changed:
[Impact]
* openssl fails to talk to letsencrypt website past September 2021,
despite trusting the letsencrypt root certificate.
[Test Plan]
* Import staging cert equivalent to ISRG Root X1
https://letsencrypt.org/certs/staging/letsencrypt-stg-root-x1.
PPA with these changes available from https://launchpad.net/~ci-train-
ppa-service/+archive/ubuntu/4594
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1928989
Title:
expir
ADT results at https://bileto.ubuntu.com/excuses/4594/xenial.html
** Description changed:
[Impact]
* openssl fails to talk to letsencrypt website past September 2021,
despite trusting the letsencrypt root certificate.
[Test Plan]
* Import staging cert equivalent to ISRG Root
python3.5 has stopped passing its testsuite due to expried test certs.
Thus upload of openssl has triggered regression in python3.5
I've cherrypicked updated test certs and keys, but to cherry-pick those
cleanly, I also had to cherrypick an earlier bug fix. All of these are
unmodified from 3.5.10
@ubuntu-sru-bot
regressions triggered by reprepro have been retried, and have been now
cleared.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to file in Ubuntu.
https://bugs.launchpad.net/bugs/1923845
Title:
Please compress
See reprepro verification comments at
https://bugs.launchpad.net/ubuntu/+source/reprepro/+bug/1933363
** Tags removed: verification-needed verification-needed-focal
verification-needed-groovy verification-needed-hirsute
** Tags added: verification-done verification-done-focal
verification-done-g
@superm1 yes I have, it is now pulled into v5.14
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2c484419efc09e7234c667aa72698cb79ba8d8ed
I will request it to be included in linux-stable series.
Note that in Impish we have now switched to zstd compression for the
ini
Uploading to ubuntu (via sftp to upload.ubuntu.com):
Uploading initramfs-tools_0.130ubuntu3.13.dsc: done.
Uploading initramfs-tools_0.130ubuntu3.13.tar.xz: done.
Uploading initramfs-tools_0.130ubuntu3.13_source.buildinfo: done.
Uploading initramfs-tools_0.130ubuntu3.13_source.changes: d
** Description changed:
[Impact]
* initramfs-tools in impish has changed default initrd compression to
zstd. To allow compressing and uncompressing such initrds on Focal LTS
release we should backport zstd support in the mkinitramfs &
unmkinitramffs tooling. For example ubuntu-cdimag
** Patch added: "lp1928989.patch"
https://bugs.launchpad.net/ubuntu/xenial/+source/openssl/+bug/1928989/+attachment/5507665/+files/lp1928989.patch
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://
** Description changed:
[Impact]
- * openssl fails to talk to letsencrypt website past September 2021,
+ * openssl fails to talk to letsencrypt website past September 2021,
despite trusting the letsencrypt root certificate.
[Test Plan]
- * Import staging cert equivalent to ISRG R
** Also affects: initramfs-tools (Ubuntu Bionic)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to initramfs-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1932542
Title:
Add supp
@cborntra
v5.13 ubuntu kernel's s390 configuration with zstd -22 --ultra
compression is 8.5 MB, whereas gzip -9 is 11M.
Thus for gzip to win at bootspeed the decompression speed has to
compensate for 2.5M of i/o and be faster than zstd.
Unaccelerated decompression comparison still gives me faste
decompression speed only needs to be faster than i/o speed, once that is
reached the best compression ratio results in the fastest bootspped.
for kernel image zstd is used with -22 --ultra, thus I can compare it
with zlib -9.
--
You received this bug notification because you are a member of Ubun
Public bug reported:
kmod add zstd support
* v27+ needs patches cherrypicked from v28
* v28+ needs new build-time deps adjusted
** Affects: kmod (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packa
# mkinitramfs -czstd -o /boot/initrd.img-5.4.0-76-generic 5.4.0-76-generic
# unmkinitramfs /boot/initrd.img-5.4.0-76-generic foo
# ls foo/
bin conf etc init lib lib64 run sbin scripts usr
# dpkg-query -W initramfs-tools zstd
initramfs-tools 0.136ubuntu6.6
zstd1.4.4+dfsg-3ubuntu0.1
#
http://launchpadlibrarian.net/543778464/initramfs-
tools_0.140ubuntu5_0.140ubuntu6.diff.gz for the depends change in
impish.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to initramfs-tools in Ubuntu.
https://bugs.launchpad.net
@sil2100 zstd depends was added in the devel series. Historically, we
only had the depends on the tool that is needed at a time for a given
series... ie. gzip, xz, lz4, zstd.
Given that zstd compressed initrds are not supported by the linux GA
kernel in Focal, I am hesitant to impose zstd dependen
** Tags removed: block-proposed-impish
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to file in Ubuntu.
https://bugs.launchpad.net/bugs/1923845
Title:
Please compress packages with zstd by default
Status in appstream-glib p
** Changed in: initramfs-tools (Ubuntu Focal)
Status: New => In Progress
** Tags added: zstd
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to initramfs-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1932542
Title:
Public bug reported:
[Impact]
* initramfs-tools in impish has changed default initrd compression to
zstd. To allow compressing and uncompressing such initrds on Focal LTS
release we should backport zstd support in the mkinitramfs &
unmkinitramffs tooling. For example ubuntu-cdimage uses unmkinit
I am told it is an apt bug, due to systemd package being phased.
See https://launchpad.net/bugs/1925745
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1932354
Title:
syst
** Also affects: hello (Ubuntu)
Importance: Undecided
Status: New
** Tags added: block-proposed-impish
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to file in Ubuntu.
https://bugs.launchpad.net/bugs/1923845
Title:
Retrying these once.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1932354
Title:
systemd/247.3-3ubuntu3.1 ADT test failure with linux/5.11.0-20.21
(Test dependencies a
The following packages have unmet dependencies:
systemd-tests : Depends: libsystemd0 (= 247.3-3ubuntu3.1) but 247.3-3ubuntu3
is to be installed
Depends: systemd (= 247.3-3ubuntu3.1)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages,
I wonder if this is ADT cloud failure.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1932354
Title:
systemd/247.3-3ubuntu3.1 ADT test failure with linux/5.11.0-20.21
(T
lintian should be good in impish-proposed, but we should migrate it
first.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to file in Ubuntu.
https://bugs.launchpad.net/bugs/1923845
Title:
Please compress packages with zstd by
Vasily Gorbik is reviewing this patch.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to initramfs-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1931725
Title:
initramfs-tools & kernel: use zstd as the default compression
@ IBM can you please review the upstream patch and merge it into the the
s390 tree ?
https://lore.kernel.org/linux-s390/20210615114150.325080-1-dimitri.led...@canonical.com/T/#u
** Description changed:
Turns out that loading is always the slow part in loading initramfs into
memory and decompr
** Summary changed:
- initramfs-tools: use zstd as the default compression method
+ initramfs-tools & kernel: use zstd as the default compression method
** Description changed:
Turns out that loading is always the slow part in loading initramfs into
memory and decompressing it since decompre
dpkg patch looks good to me.
did lintian patch locally and started to run the regression test suite
locally to see if anything else is tripped up.
working on reprepro changes too.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed
** Changed in: initramfs-tools (Ubuntu)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to initramfs-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1931725
Title:
initramfs-tools: use zstd
** Information type changed from Public to Public Security
** Tags removed: letsencrypt
** Tags added: letsencryptexpiry
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/19289
Public bug reported:
[Impact]
* openssl fails to talk to letsencrypt website past September 2021,
despite trusting the letsencrypt root certificate.
[Test Plan]
* Import staging cert equivalent to ISRG Root X1
https://letsencrypt.org/certs/staging/letsencrypt-stg-root-x1.pem
* Import expire
** Tags removed: verification-needed verification-needed-focal
** Tags added: verification-done verification-done-focal
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/
sru-release comments:
virtualbox-hwe/6.1.16-dfsg-6ubuntu1.20.04.2 (s390x, ppc64el, armhf,
arm64) -> autopkgtest failures are a false negative. It only is built
and supported on amd64
sysdig/riscv64 - ftbfs is not a regression, never built on riscv64 in
focal
zfs-linux/riscv64 - ftbfs is not a re
virtualbox-hwe/6.1.16-dfsg-6ubuntu1.20.04.2 (s390x, ppc64el, armhf,
arm64) -> is a false negative. virtualbox-hwe is only supported on amd64
i thought.
https://autopkgtest.ubuntu.com/packages/v/virtualbox
https://autopkgtest.ubuntu.com/packages/v/virtualbox-hwe
Suggests that to be the case.
--
debdiffs are on https://bileto.ubuntu.com/#/ticket/4543
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1914279
Title:
linux from security may force reboots without complete dk
I've rebuilt all the packages mentioned above in bileto ppa against
security pocket and pushed them to focal-proposed queue, ready for sru
review and accept.
All, but openafs which ftbfs now, and will need to be fixed up for v5.11
anyway. So it will be rebuild in security pocket with v5.11 fixes l
My understanding of resilient boot is that there are multiple ESPs
trying to boot the same raid device.
If there is only one rootfs filesystem, boot that one. Which in case of
raid, there will be only one.
I'm more concerned about the case of two ubuntu-server preinstalled
images on two usb stick
I am glad that this worked out fine now.
I am not sure there is time to fix this in 20.10, as it has only a few
months of support left. I hope that having libffi7 in 21.04 is enough.
** Changed in: pyopenssl (Ubuntu Groovy)
Status: Incomplete => Invalid
** Changed in: pyopenssl (Ubuntu)
** Changed in: systemd (Ubuntu)
Assignee: Dimitri John Ledkov (xnox) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1779721
Title:
systemd-netwo
20.04.1 is obsolete point release. Can you please try with 20.04.2?
** Changed in: nvidia-graphics-drivers-455 (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://b
** Also affects: apt (Ubuntu)
Importance: Undecided
Status: New
** Tags added: rls-hh-incoming
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1923150
Title:
unexpec
@callegar
It would be nice to see the full resolvectl status.
Because depending on which things you have configured it might be
expected to have DNSSEC validation working, and the request is routed to
multiple interfaces, and none of them return results or the results fail
to validate.
Also note
Public bug reported:
Ideally we should strive to boot rootfs from a matching hard drive.
I.e. if we are booting rootfs by UUID, we should try to find the one
that came from the same drive as where ESP (UEFI) came from, or u-boot
spl / u-boot got loaded from (loader1/loader2).
Such that for examp
It is possible that you have the key in _two_ keyrings in trusted.gpg.d/
& in trusted.gpg itself.
It would be best for you to do the following:
1) sudo apt remove --purge ubuntu-dbgsym-keyring
2) sudo apt-key del 0xC8CAB6595FDFF622
3) sudo apt-key list | grep C8CAB6595FDFF622 => it should be em
Alternative to all of the above, you could choose to "enable all the
devices" hack on 18.04.
Aka if the MAAS initrd includes a script to do `chzdev -e --all` by
default on 18.04.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed t
In https://launchpad.net/ubuntu/+source/initramfs-tools/0.133ubuntu3 in
eoan+ manual chzdev -e got added to activate qeth devices, if they have
been specified in the ip= command, i.e. if enc300 is the device in the
ip= command.
This has not been backported to bionic.
To boot without specifying th
** Description changed:
[Impact]
- * Cannot update apt metadata from ddebs.ubuntu.com whilst using ubuntu-
+ * Cannot update apt metadata from ddebs.ubuntu.com whilst using ubuntu-
dbgsym-keyring package
[Test Plan]
+ * Install ubuntu-dbgsym-keyring package
+ * Add ddebs.ubuntu.
** Changed in: ubuntu-keyring (Ubuntu Hirsute)
Status: Fix Released => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ubuntu-keyring in Ubuntu.
https://bugs.launchpad.net/bugs/1920640
Title:
EXPKEYSIG
201 - 300 of 2764 matches
Mail list logo