Hi Erich,
> Hi Simon,
>
> So, not that this relieves stress on anyone as we're all going to want
> to beat this (or wait for the long, long queues), but I assume you mean
Unless your package lands in the huge queue, you wouldn't be stuck
behind the glibc tests, the entire syste
that a package
> built after the glibc upload would pick up a versioned dependency on the
> newer glibc due to changes in ABIs for existing functions. In that case,
> said package would need to wait until glibc has migrated, which can take
> a little while.
>
> Feel free to reach out
Hi Steve,
> On Tue, Jan 23, 2024 at 02:02:15AM -0800, Simon Chopin wrote:
> > Hi Release Team,
>
> > It seems we have a few big transitions either in progress (perl,
> > python) or about to start in the coming weeks (php, armhf 64bit time_t).
> > My original
of Qt 6
packaging for these is quite limited in 22.04. If you need these for a
client deployment of some kind, let me know personally.
Thanks,
--
Simon Quigley
si...@tsimonq2.net
@tsimonq2:ubuntu.com on Matrix
tsimonq2 on LiberaChat and OFTC
5C7A BEA2 0F86 3045 9CC8
C8B5 E27F 2CF8 458C 2FA4
Hi Graham,
> > A possible way to reduce the friction introduced by a new glibc verison
> > would be to delay it until after Feature Freeze: fewer packages would
> > pick up the new symbols and thus wouldn't get blocked waiting for the
> > glibc rdeps autopkgtests to clear.
>
> Does it need to be
) on IRC if you have questions.
Cheers,
Simon
--
ubuntu-devel mailing list
ubuntu-devel@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel
pick the new ABIs, which presumably bring in some
sort of improvement in one form or another.
* The newer glibc would be tested for less time, although presumably
that's somewhat offset by it taking less time to reach the release
pocket from -proposed.
WDYT?
Cheers,
Simon
--
Ubuntu-release
;
> Primary contact: Simon (tsimonq2)
> Secondary Contact: Dan (kc2bez)
> Third-tier contact (if Simon and Dan don't reply): Aaron (arraybolt3)
We'll be discussing this internally on a Lubuntu Council level after our
next election cycle. I get the feeling that Dan and Aaron both need to
Release Team accept this with open
arms, and assist us in guiding Aaron and Dan in their Release Management
duties.
[1] https://git.lubuntu.me/lubuntu-wiki/wiki/wiki/Constitution
Best regards,
--
Simon Quigley
si...@tsimonq2.net
tsimonq2 on LiberaChat and OFTC
@tsimonq2:ubuntu.com on Matrix
5C7A
0/+bug/2047705
Warm regards,
--
Simon Quigley
si...@tsimonq2.net
tsimonq2 on LiberaChat and OFTC
@tsimonq2:ubuntu.com on Matrix
5C7A BEA2 0F86 3045 9CC8
C8B5 E27F 2CF8 458C 2FA4
smime.p7m
Description: smime.p7m
--
Ubuntu-release mailing list
Ubuntu-release@lists.ubuntu.com
Modify settings or un
,
--
Simon Quigley
si...@tsimonq2.net
tsimonq2 on LiberaChat and OFTC
@tsimonq2:linuxdelta.com on Matrix
5C7A BEA2 0F86 3045 9CC8
C8B5 E27F 2CF8 458C 2FA4
OpenPGP_signature.asc
Description: OpenPGP digital signature
--
ubuntu-devel mailing list
ubuntu-devel@lists.ubuntu.com
Modify settings or unsubscribe
benefiting both our users
and developers.
Please let me know what your thoughts are, otherwise I will get started on some
code.
Thank you for your time,
--
Simon Quigley
si...@tsimonq2.net
tsimonq2 on LiberaChat and OFTC
@tsimonq2:linuxdelta.com on Matrix
5C7A BEA2 0F86 3045 9CC8
C8B5
off of Ubiquity.
If you have any concerns regarding your participation, or a switch in
installers, please feel free to reach out to me, or anyone from the
~ubuntu-release team.
Thank you!
--
Simon Quigley
si...@tsimonq2.net
tsimonq2 on LiberaChat and OFTC
@tsimonq2:linuxdelta.com on Matrix
Hi all,
During the release week, we decided to still do a +1 rotation: as in
yours truly. I was supposed to be shadowed by Paul Mars (upils), but it
turns out that Paul ended up going off on his own since I had some last
minute release-related things to investigate, some paperwork to do,
etc...
version is the 390, which
appears not to be available in Mantic but was in Lunar.
It's not a huge problem as the feature coverage of nouveau for old
GPUs is pretty decent, however I'd like to know whether it was
intentional, and if so, can someone mention that in the release notes?
Cheers,
Simon
2891f29dc7bab7d110b
[2] https://irclogs.ubuntu.com/2023/10/04/%23ubuntu-devel.html#t18:39
--
Simon Quigley
si...@tsimonq2.net
tsimonq2 on LiberaChat and OFTC
@tsimonq2:linuxdelta.com on Matrix
5C7A BEA2 0F86 3045 9CC8
C8B5 E27F 2CF8 458C 2FA4
OpenPGP_signature.asc
Description: OpenPGP digital signature
--
ub
This was fixed in ca-certificates version 20211016 which is what Jammy
released with. As of today, all Ubuntu releases from Bionic onward ship
20230311 so marking as fix released.
** Changed in: ca-certificates (Ubuntu)
Status: Triaged => Fix Released
--
You received this bug
Hi,
Quoting Mauricio Faria de Oliveira (2023-08-15 15:20:50)
> Hey,
>
> I'd like to request input (initially thinking of involved teams: SRU,
> Foundations)
> on backports of some performance improvement patches to OpenSSL in Jammy.
> (Please feel free to comment and include others as
to enable it.
As usual with this sort of flags, it might trip some code that
was silently buggy, resulting in FTBFS.
You can find a human-readable changelog for the 2.38 release there:
https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=NEWS;hb=HEAD
Cheers,
--
Simon Chopin
Foundations Team
, as well as a few builds of Rust crates that were just waiting for
their new build-deps to be available.
Cheers,
--
Simon Chopin
Foundations TeamUbuntu MOTU/Core Dev
simon.cho...@canonical.comscho...@ubuntu.com
--
ubuntu-devel mailing list
Nowadays, btrfs snapshots can only be taken by the owner of the source
subvol. https://btrfs.readthedocs.io/en/latest/ch-mount-
options.html#btrfs-specific-mount-options:
> Historically, any user could create a snapshot even if he was not
owner of the source subvolume, the subvolume deletion has
/2020902
### visual-excuses
To find on which package to work on, I used mclemenceau's visual-excuses
tool. Of course, I stumbled upon and fixed some small issues :)
https://github.com/mclemenceau/visual-excuses/pull/4
Cheers,
Simon
--
ubuntu-devel mailing list
ubuntu-devel@lists.ubuntu.com
release on Feb 1.
Would either that last option or even the direct use of the upstream
branch as micro-release updates be acceptable for an SRU?
Cheers,
--
Simon Chopin
Foundations TeamUbuntu MOTU/Core Dev
simon.cho...@canonical.comscho.
I have that same stuck at splash screen bug on my MacBook Air, quite
annoying.
On Fri, 14 Apr 2023, 18:48 Doc C, wrote:
> I have the same reaction.
>
> KDE is pretty and all, but one (really annoying!!) bug on my AMD
> Ryzen7/Radeon based desktop is the splash screen gets "stuck" and won't let
investigating[2].
In the mean time, you can use my PPA[3] to test your packages against a
very recent snapshot (with the exception of the armhf architecture which
is currently FTBFS).
Cheers,
Simon
[0]: https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=NEWS;hb=HEAD
[1]:
https
uce it reliably, and
narrow it down to an issue in libgnat or libgcc_s in exception handling.
--
Simon Chopin
Foundations TeamUbuntu MOTU/Core Dev
simon.cho...@canonical.comscho...@ubuntu.com
--
ubuntu-devel mailing list
ubuntu-de
Zotero directement.
Plus globalement, si vous avez des questions sur Ubuntu, je vous suggère
d'utiliser la liste de diffusion francophone dédiée:
https://lists.ubuntu.com/mailman/listinfo/ubuntu-fr
Cordialement,
Simon Chopin
English version:
I wasn't able to find Zotero within the official
Hello,
My name is Simon Quigley, and I'm currently the Lubuntu Release Manager.
I have been an Ubuntu Member since February 2016 (about a month before I
turned 14 years old). I once held hats on the Ubuntu Membership Board,
Ubuntu Developer Membership Board, Ubuntu Weekly Newsletter, Kubuntu
in Jammy is to point us towards the
specific commit(s) that address the problem at hand, or, even better,
prepare a debdiff with those patches to get the package sponsored.
Cheers,
Simon
¹: Whole new upstream versions can still be backported when going
through the Backports process, see https://
** Tags removed: foundations-triage-discuss
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1968334
Title:
Fix CVE-2019-13115
To manage notifications about this bug go to:
** Also affects: libssh2 (Ubuntu Bionic)
Importance: Undecided
Status: New
** Also affects: libssh2 (Ubuntu Focal)
Importance: Undecided
Status: New
** Changed in: libssh2 (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you
** Summary changed:
- libssh2 upgrade
+ Fix CVE-2019-13115 in Focal
** Changed in: libssh2 (Ubuntu)
Status: New => Triaged
** Changed in: libssh2 (Ubuntu)
Status: Triaged => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
/tree/live-build/auto/config#n132
[2] https://phab.lubuntu.me/w/release-team/testing-checklist/
Thanks,
--
Simon Quigley
si...@tsimonq2.net
tsimonq2 on LiberaChat and OFTC
@tsimonq2:linuxdelta.com on Matrix
5C7A BEA2 0F86 3045 9CC8
C8B5 E27F 2CF8 458C 2FA4
OpenPGP_signature
Description: OpenPGP
Here you are:
https://bugs.launchpad.net/ubuntu-cdimage/+bug/1980410
On 6/30/22 05:49 AM, Lukasz Zemczak wrote:
Hey Simon!
Interesting. Can you fill a bug under the
https://bugs.launchpad.net/ubuntu-cdimage/ project? I'll investigate
it now, since I think the rebuild gets queued
ld you please open a bug in Launchpad[0] describing precise steps to
reproduce the issue? That would make it much easier for us to ship a
fix.
[0]: https://bugs.launchpad.net/ubuntu/+source/trustedqsl/+filebug
Cheers,
--
Simon Chopin
Foundations Team U
Quoting Heinrich Schuchardt (2022-06-29 12:56:57)
> On 6/29/22 10:33, Simon Chopin wrote:
> > Hi!
> >
> > As part of our efforts to support the Rust toolchain in main, we need to
> > have libgit2 in main (dependency of cargo). However, it currently links
> > agai
provide some insight as to what is
happening on the server-side, perhaps providing some logs?
Thanks.
--
Simon Quigley
si...@tsimonq2.net
tsimonq2 on LiberaChat and OFTC
@tsimonq2:linuxdelta.com on Matrix
5C7A BEA2 0F86 3045 9CC8
C8B5 E27F 2CF8 458C 2FA4
OpenPGP_signature
Description: OpenPGP
it re-export any of their symbols (assuming I understand
the output of readelf -s correctly).
Could someone confirm that this does not represent a breaking change?
Cheers,
--
Simon Chopin
Foundations Team Ubuntu Core Dev
simon.cho...@canonical.com
FTBFS
due to endianness issues. I cherry-picked an upstream patch and
submitted it to Debian, which was subsequently synced.
That's all!
--
Simon Chopin
Foundations Team Ubuntu Core Dev
simon.cho...@canonical.comscho...@ubuntu.com
@kip, it seems the problem was merely a configuration issue on your
machine (missing SSL cert file), not a bug in NGINX or NGINX's package.
As such, we probably don't need to look further into your logs but if
you want to take a look, they should still be available for you to
consult with
Speakers are working for me now after installing the BIOS update from
2022-06-02.
https://pcsupport.lenovo.com/de/en/products/laptops-and-netbooks/legion-
series/legion-7-16achg6/downloads/driver-list/component?name=BIOS%2FUEFI
I booted on windows, installed the update and after switching to
@kip, it should in theory not have crashed the installer. Only the
nginx(-*) package(s) should be left unconfigured. You can check that
with "dpkg -l | grep -v ^ii", it should show you which packages need
attention.
--
You received this bug notification because you are a member of Ubuntu
Bugs,
The chain is rustc -> llvm-13 -> llvm-13-dev -> z3, so that's still an
issue with Jammy, I think. Reopening :)
** Changed in: rustc (Ubuntu Jammy)
Status: Invalid => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
hanged in: calamares-settings-ubuntu (Ubuntu Jammy)
Importance: Undecided => Medium
** Changed in: calamares-settings-ubuntu (Ubuntu Kinetic)
Importance: Undecided => Medium
** Changed in: calamares-settings-ubuntu (Ubuntu Jammy)
Assignee: (unassigned) => Simon Quigley (tsimon
Public bug reported:
Imported from Debian bug http://bugs.debian.org/1012262:
Source: libisal
Version: 2.30.0-4
Severity: normal
X-Debbugs-Cc: scho...@ubuntu.com
This package fails to build on big-endian architectures, notably s390x.
There's a fix available upstream:
Adding fastp to the affected packages as this blocks its transition from
-proposed.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1976622
Title:
libisal: FTBFS on big-endian architectures
To
Public bug reported:
Imported from Debian bug http://bugs.debian.org/996235:
[,
]
** Affects: ruby-gitlab-fog-azure-rm (Ubuntu)
Importance: Undecided
Status: New
** Affects: ruby-gitlab-fog-azure-rm (Debian)
Importance: Undecided
Status: New
** Tags: update-excuse
*** This bug is a duplicate of bug 1968831 ***
https://bugs.launchpad.net/bugs/1968831
** This bug has been marked a duplicate of bug 1968831
ruby-tty-screen: endianness bug detected by autopkgtest
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
A workaround is present in 2.0.22+dfsg-4, but the fact that `testatomic`
crashes seems like a bug somewhere (SDL? Ubuntu's toolchain? Ubuntu's
buildds? ...) so I'm reopening this.
** Changed in: libsdl2 (Ubuntu)
Status: Fix Released => New
--
You received this bug notification because
for squid and bind9 to receive microrelease SRUs! I would
happily contribute testing for those if that can be of any help.
Regards,
Simon
--
ubuntu-server mailing list
ubuntu-server@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server
More info: https://wiki.ubuntu.com/ServerTeam
Public bug reported:
Imported from Debian bug http://bugs.debian.org/1012204:
Source: ruby-tty-screen
Version: 0.7.1-2
Severity: normal
X-Debbugs-Cc: scho...@ubuntu.com
Hi,
The autopkgtests for this package fail on s390x, apparently due to an
endianness issue. See
As I had hoped, libsdl2_2.0.22+dfsg-4 in Debian is now running all the
tests (successfully), while libsdl2_2.0.22+dfsg-4~build1 in Ubuntu is
skipping the one that previously crashed on Ubuntu and running the rest.
--
You received this bug notification because you are a member of Ubuntu
Bugs,
** Tags added: transition-openssl3-jj
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1976299
Title:
hashlib.algorithms_available lists algorithms that cannot be used
To manage notifications about
libsdl2_2.0.22+dfsg-4 in Debian hopefully works around this crash, while
still having at least minimal test coverage on Ubuntu arm64.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1976288
Title:
Public bug reported:
Imported from Debian bug http://bugs.debian.org/1012125:
Source: astroquery
Version: 0.4.6+dfsg-2
Severity: serious
Justification: RT
X-Debbugs-Cc: simon.cho...@canonical.com
Hi,
The autopkgtests for 0.4.6+dfsg-2 fail with attempts to write to
locations in /usr/lib,
I would prefer it if any tests that need to be skipped conditionally are
accompanied by a reference to a bug report (on the basis that a failing
test is technical debt, and technical debt is a bug), either in
Launchpad for workarounds for Ubuntu-specific issues, in the Debian BTS
for workarounds
Public bug reported:
The 'testatomic' test-case crashes with a segmentation fault on Ubuntu
arm64 buildds, resulting in build-time test results being ignored (via a
change from Gianfranco Costamagna).
Is this a known problem with the Ubuntu buildds? If yes, is there a
timeline for when it can be
** Description changed:
+ [Impact]
+
+ The TLS test server `openssl s_server` can very easily be led into an
+ infinite loop if configured with incompatible settings and used via
+ DTLS. This makes it harder to test one's TLS configuration.
+
+ [Test plan]
+
+ In one session:
+ $ openssl
** Patch added: "rustc.debdiff"
https://bugs.launchpad.net/ubuntu/+source/rustc/+bug/1971128/+attachment/5593815/+files/rustc.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971128
Title:
** Description changed:
- openssl.cnf as provided misses some directive, which make it a bit
- difficult to change security level, which since openssl 3 disables SHA1
- signatures.
+ [Impact]
+
+ The OpenSSL 3.0 lead to a lot of broken setups. Some of them are
+ regressions, but others are
(Ubuntu Kinetic)
Status: Incomplete => Invalid
** Changed in: rustc (Ubuntu Jammy)
Status: New => Confirmed
** Changed in: rustc (Ubuntu Kinetic)
Status: New => Confirmed
** Changed in: rustc (Ubuntu Jammy)
Assignee: (unassigned) => Simon Chopin (schopin)
--
You rec
** Summary changed:
- [MIR] z3
+ z3 is incorrectly marked as a MIR candidate
** Description changed:
- TDB by foundations.
+ rustc pulls llvm-13 into main (the llvm-toolchain-13 being already
+ partially seeded, it doesn't raise any issue), and z3 is a dependency of
+ it.
** Also affects:
Refreshed version of the same thing, with the merge fixed, adding
Replaces/Breaks fields due to the Ubuntu/Debian divergence on which
package ships the new static libraries.
I used the dh-exec mechanism for the i386 exception as it is what is
used in the current Salsa 13 branch for their
MySQL 5.1 has long been EOL in Ubuntu and upstream. Please open a new
bug if MySQL 5.7 or MySQL 8.0 as shipped in currently supported Ubuntu
version still have the problem.
** Changed in: mysql-dfsg-5.1 (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification
** Description changed:
- Imported from Debian bug http://bugs.debian.org/1010958:
+ [Impact]
+
+ The fix for
+ https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1968997 has
+ broken some code paths as the new string comparison functions now need
+ initialization, triggering segafults.
+
+
Attached is a debdiff for the Jammy changes. I'm still working on
Kinetic as this will be folded into the merge, but I still need to do
some more work as some new patches have surfaced upstream since then, as
well as a new Debian revision. I feel the Jammy SRU should still move
forward.
Note that
** Changed in: openssl (Ubuntu Kinetic)
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1974037
Title:
openssl: EVP_EC_gen() segfault without init
To manage
This has long been fixed.
** Changed in: mysql-dfsg-5.1 (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/779670
Title:
The usage of --defaults-file
for itself.
Simon.
On 19/05/2022 20:51, Eric Blevins wrote:
> Public bug reported:
>
> RFC2308 states:
> 6 - Negative answers from the cache
>
> When a server, in answering a query, encounters a cached negative
> response it MUST add the cached SOA
Here's a merge of llvm-toolchain-13 that includes this patch, along with
another one for https://bugs.launchpad.net/ubuntu/+source/llvm-
toolchain-13/+bug/1973041
Build in progress there:
https://launchpad.net/~schopin/+archive/ubuntu/rustc-1.59/+sourcepub/13636485/+listing-
archive-extra
**
** Merge proposal linked:
https://code.launchpad.net/~schopin/ubuntu/+source/openssl/+git/openssl/+merge/423153
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1974037
Title:
openssl:
Here's a MP using git-ubuntu (well, with a lot of manual fiddling):
https://code.launchpad.net/~schopin/ubuntu/+source/openssl/+git/openssl/+merge/423153
I'd appreciate it the upload would be using rich history support:
https://lists.ubuntu.com/archives/ubuntu-devel/2021-October/041649.html
as
FWIW, Debian just scrapped the postinst entirely, advising users to use
needrestart or checkrestart instead.
In my upcoming merge I'll revert the deletion, but I'd be happy to go
back and remove that part of the delta once I understand how all the
pieces fit together.
--
You received this bug
*** This bug is a duplicate of bug 1974037 ***
https://bugs.launchpad.net/bugs/1974037
** This bug has been marked a duplicate of bug 1974037
openssl: EVP_EC_gen() segfault without init
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
I *think* this is a duplicate of
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1974037 but I'll
keep it separate for now as the API used to trigger the issue isn't the
same.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Description changed:
- TBD
+ [Availability]
+ The packages libxs-parse-sublike-perl, libobject-pad-perl, libindirect-perl,
libunicode-escape-perl, libunicode-string-perl are already in Ubuntu universe
and build for the architectures they're designed to work on.
- All of those new
@Dave @XA Okay. It worked for me though. Just hope it wasn't a temporary
fix.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1969512
Title:
Totem unable to play video: "The specified movie could not
Thanks for the follow up! I'll try to fold the fix for this in the next
Jammy SRU, I don't know about other releases yet.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1947588
Title:
Infinite Loop
Run this command:
sudo apt remove gstreamer1.0-vaapi
Got my solution from this article, check it out too.
https://www.makeuseof.com/things-to-do-after-upgrading-to-ubuntu-2204-lts/
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
) unstable; urgency=medium
* Team upload.
[ Simon Chopin ]
* Cherry-pick an OpenSSL fix (LP: #1945798)
-- gregor herrmann Thu, 13 Jan 2022 19:55:56 +0100
** Affects: libcrypt-openssl-rsa-perl (Ubuntu)
Importance: Wishlist
Status: New
** Changed in: libcrypt-openssl-rsa
Uploaded to Kinetic, I'll review and upload the others tomorrow.
** Changed in: opencryptoki (Ubuntu Focal)
Assignee: (unassigned) => Simon Chopin (schopin)
** Changed in: opencryptoki (Ubuntu Impish)
Assignee: (unassigned) => Simon Chopin (schopin)
** Changed in: opencryptoki (
The same problem can be reproduced with the sbsa 510 driver from the
NVIDIA CUDA repository (see https://developer.nvidia.com/cuda-
downloads?target_os=Linux_arch=arm64-sbsa=Native=Ubuntu_version=22.04_type=deb_network)
--
You received this bug notification because you are a member of Ubuntu
This issue has been introduced in 3.0.3 upstream but we've backported
the patch set to Jammy as well. The cherry-picked fix is in Debian in
3.0.3-4.
** Changed in: openssl (Ubuntu)
Status: New => Confirmed
** Also affects: openssl (Ubuntu Kinetic)
Importance: Undecided
Status:
Public bug reported:
Imported from Debian bug http://bugs.debian.org/1010958:
Source: sscg
Version: 3.0.2-1
Severity: serious
Tags: ftbfs
https://buildd.debian.org/status/logs.php?pkg=sscg=3.0.2-1%2Bb1
...
1/10 generate_rsa_key_test FAIL 0.01s killed by signal 11
SIGSEGV
Also, does tinc work in a purely Jammy context? :-)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1972939
Title:
Jammy tinc incompatibile with older (e.g. Xenial) tinc nodes
To manage
Could you give more details about what happens when using the legacy
providers?
** Changed in: tinc (Ubuntu)
Importance: Undecided => High
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1972939
Public bug reported:
The version 3.0.3-4 from Debian unstable should be merged in Kinetic.
** Affects: openssl (Ubuntu)
Importance: High
Assignee: Simon Chopin (schopin)
Status: Confirmed
** Tags: fr-2393
** Tags added: fr-2393
--
You received this bug notification
Hi!
You want to add -traditional to your openssl rsa command to get the
previous behaviour:
❯ openssl rsa -in key.pem | grep BEGIN
writing RSA key
-BEGIN PRIVATE KEY-
❯ openssl rsa -in key.pem -traditional | grep BEGIN
writing RSA key
-BEGIN RSA PRIVATE KEY-
** Changed in:
I'm guessing there are some SSL certificates involved? If so, this issue
is mentioned in the release notes: certificates that use e.g. SHA1 as
the digest algorithm should be re-issued by your provider with a
stronger hash algorithm.
Would you be able to check that it is the correct diagnostic?
If
Public bug reported:
upgrade from 16.04 to 18.04 failed
ProblemType: Bug
DistroRelease: Ubuntu 16.04
Package: ubuntu-release-upgrader-core 1:16.04.32
ProcVersionSignature: Ubuntu 4.15.0-142.146~16.04.1-generic 4.15.18
Uname: Linux 4.15.0-142-generic x86_64
NonfreeKernelModules:
Currently blocked on Kinetic and Jammy by those bugs:
https://bugs.launchpad.net/ubuntu/+source/llvm-toolchain-13/+bug/1973037
https://bugs.launchpad.net/ubuntu/+source/llvm-toolchain-13/+bug/1973041
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
Public bug reported:
See https://github.com/rust-lang/llvm-project/pull/121
This is required for rustc 1.59, which in turn is required for Firefox
100 and related tunderbird.
** Affects: llvm-toolchain-13 (Ubuntu)
Importance: Undecided
Status: New
** Affects: llvm-toolchain-13
** Tags added: rls-jj-incoming rls-kk-incoming
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1973037
Title:
llvm-toolchain-13: please backport upstream D115098 for rust
To manage notifications
This is necessary for rustc 1.59, which in turn is needed for Firefox
100.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1973037
Title:
llvm-toolchain-13: please backport upstream D115098 for rust
Public bug reported:
Imported from Debian bug http://bugs.debian.org/1010150:
Source: llvm-toolchain-13
Version: 1:13.0.1-3
Severity: normal
Tags: patch upstream
Control: affects + rustc
Dear Maintainer,
Please backport upstream https://reviews.llvm.org/D115098
It is needed for rust 1.59,
Update of the patch to add additional dep-3 Bug-Ubuntu field.
** Patch added: "libnet-ssleay-perl.kinetic.debdiff"
https://bugs.launchpad.net/ubuntu/+source/libnet-ssleay-perl/+bug/1972795/+attachment/5588508/+files/libnet-ssleay-perl.kinetic.debdiff
--
You received this bug notification
Attached is a debdiff for this change, as reviewed by the Debian
maintainer. As indicated on the bug there, this will not be uploaded to
Debian until their 3.0 transition starts, hence the need to introduce a
delta in Ubuntu.
You can find a built version of the package in my PPA:
Hi,
The libssl1.1 package was provided by the 1.1.1 branch of OpenSSL, which
is obsolete and will cease to receive security support from upstream in
2023. We chose to migrate the archive to the new 3.0 version. See this
ML thread for more details: https://lists.ubuntu.com/archives/ubuntu-
** Tags added: rls-kk-incoming
** Tags added: rls-jj-incoming
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1972056
Title:
[openssl3] please sync openssl.cnf to ease changing security level
To
The issue is not that the www-data user cannot login. The www-data user
does not have access to any roundcube files or the roundcube database.
The issue is that the roundcube package must not assume any particular
webserver configuration, including the existence of a www-data user.
--
You
401 - 500 of 18197 matches
Mail list logo