[Bug 1934988] Re: Upgrade s390-tools to latest version (2.17.0)

2021-07-12 Thread Simon Chopin
Here's a debdiff for the upgrade, along with one for -signed.

** Patch added: "s390-tools-2.17.0-0ubuntu1.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/s390-tools/+bug/1934988/+attachment/5510535/+files/s390-tools-2.17.0-0ubuntu1.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1934988

Title:
  Upgrade s390-tools to latest version (2.17.0)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/s390-tools/+bug/1934988/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1934988] Re: Upgrade s390-tools to latest version (2.17.0)

2021-07-12 Thread Simon Chopin
With the -signed debdiff

** Patch added: "s390-tools-signed-2.17.0-0ubuntu1.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/s390-tools/+bug/1934988/+attachment/5510536/+files/s390-tools-signed-2.17.0-0ubuntu1.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1934988

Title:
  Upgrade s390-tools to latest version (2.17.0)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/s390-tools/+bug/1934988/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1934988] Re: Upgrade s390-tools to latest version (2.17.0)

2021-07-12 Thread Simon Chopin
Oh, I forgot to specify:

I tested the changes in a s390x VM by installing all "s390-tools-*"
packages and running their binaries with `--help` as argument as a
sanity check. I also tested a system reboot.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1934988

Title:
  Upgrade s390-tools to latest version (2.17.0)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/s390-tools/+bug/1934988/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1935972] [NEW] postinst: Rely on needrestart when present on the system

2021-07-13 Thread Simon Chopin
Public bug reported:

This patch bypasses the custom restarting logic backed into the postinst
script if the needrestart utility is present, as it allows sharing the
logic with the rest of the system.

It also changes the custom logic to compare the old package version to
the current one instead of a hard-coded value. I don't feel particularly
strongly about this, so feel free to drop it :)

** Affects: pam (Ubuntu)
 Importance: Undecided
 Status: New

** Patch added: "debdiff"
   https://bugs.launchpad.net/bugs/1935972/+attachment/5510736/+files/debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1935972

Title:
  postinst: Rely on needrestart when present on the system

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pam/+bug/1935972/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1935972] Re: postinst: Rely on needrestart when present on the system

2021-07-13 Thread Simon Chopin
** Attachment added: "V2 addressing comments by bdmurray on IRC."
   
https://bugs.launchpad.net/ubuntu/+source/pam/+bug/1935972/+attachment/5510741/+files/debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1935972

Title:
  postinst: Rely on needrestart when present on the system

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pam/+bug/1935972/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1934988] Re: Upgrade s390-tools to latest version (2.17.0)

2021-07-13 Thread Simon Chopin
Thank you for the thorough review!

Here's an amended patch with the requested modifications.

** Patch added: "s390-tools-2.17.0-0ubuntu1.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/s390-tools/+bug/1934988/+attachment/5510749/+files/s390-tools-2.17.0-0ubuntu1.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1934988

Title:
  Upgrade s390-tools to latest version (2.17.0)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/s390-tools/+bug/1934988/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914740] Re: IPs are not assigned for Hipersockets in DHCP mode

2021-07-20 Thread Simon Chopin
** Changed in: systemd (Ubuntu Focal)
   Status: New => In Progress

** Changed in: systemd (Ubuntu Focal)
 Assignee: (unassigned) => Simon Chopin (schopin)

** Changed in: systemd (Ubuntu Hirsute)
   Status: New => In Progress

** Changed in: systemd (Ubuntu Hirsute)
 Assignee: (unassigned) => Simon Chopin (schopin)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914740

Title:
  IPs are not assigned for Hipersockets in DHCP mode

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1914740/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914740] Re: IPs are not assigned for Hipersockets in DHCP mode

2021-07-20 Thread Simon Chopin
** Changed in: systemd (Ubuntu Impish)
   Status: Confirmed => In Progress

** Changed in: systemd (Ubuntu Impish)
 Assignee: (unassigned) => Simon Chopin (schopin)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914740

Title:
  IPs are not assigned for Hipersockets in DHCP mode

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1914740/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914740] Re: IPs are not assigned for Hipersockets in DHCP mode

2021-07-21 Thread Simon Chopin
** Changed in: systemd (Ubuntu Focal)
   Status: In Progress => Fix Committed

** Changed in: systemd (Ubuntu Hirsute)
   Status: In Progress => Fix Committed

** Changed in: systemd (Ubuntu Impish)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914740

Title:
  IPs are not assigned for Hipersockets in DHCP mode

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1914740/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1931994] Re: [Ubuntu 20.04] OpenSSL bugs im s390x AES code

2021-07-21 Thread Simon Chopin
** Attachment added: "Standalone C program from the upstream test case"
   
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1931994/+attachment/5512579/+files/evp_extra_test.c

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1931994

Title:
  [Ubuntu 20.04] OpenSSL bugs im s390x AES code

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1931994/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1931994] Re: [Ubuntu 20.04] OpenSSL bugs im s390x AES code

2021-07-23 Thread Simon Chopin
** Attachment removed: "Standalone C program from the upstream test case"
   
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1931994/+attachment/5512579/+files/evp_extra_test.c

** Attachment added: "Tiny test program"
   
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1931994/+attachment/5513212/+files/test.c

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1931994

Title:
  [Ubuntu 20.04] OpenSSL bugs im s390x AES code

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1931994/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1931994] Re: [Ubuntu 20.04] OpenSSL bugs im s390x AES code

2021-07-23 Thread Simon Chopin
Updated description in preparation for SRU requests

** Description changed:

  Problem description:
+ 
+ When passing a NULL key to reset AES EVC state, the state wouldn't be 
completely reset on s390x.
  https://github.com/openssl/openssl/pull/14900
-  
+ 
  Solution available here:
  
https://github.com/openssl/openssl/commit/dc67210d909b5dd7a50f60a96f36f3f5a891b1c8
-  
  
  Should be applied to all distros where openssl 1.1.1 is included for 
consistency reason.
  -> 21.10, 20.04, 18.04.
  I think not needed for 16.04 anymore
+ 
+ [Test plan]
+ 
+ $ sudo apt install libssl-dev
+ $ gcc test.c -o evc-test -lcrypto -lssl # See 
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1931994/comments/2 for 
the test.c program
+ $ ./evc-test && echo OK
+ 
+ [Where problems could occur]
+ 
+ This patch only touches s390x code paths, so there shouldn't be any 
regression on other architectures. However, on s390x this could reveal
+ latent bugs by spreading a NULL key to new code paths.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1931994

Title:
  [Ubuntu 20.04] OpenSSL bugs im s390x AES code

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1931994/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1931994] Re: [Ubuntu 20.04] OpenSSL bugs im s390x AES code

2021-07-23 Thread Simon Chopin
-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1931994

Title:
  [Ubuntu 20.04] OpenSSL bugs im s390x AES code

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1931994/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1931994] Re: [Ubuntu 20.04] OpenSSL bugs im s390x AES code

2021-07-23 Thread Simon Chopin
** Patch added: "Focal SRU debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1931994/+attachment/5513254/+files/openssl_focal.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1931994

Title:
  [Ubuntu 20.04] OpenSSL bugs im s390x AES code

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1931994/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1931994] Re: [Ubuntu 20.04] OpenSSL bugs im s390x AES code

2021-07-23 Thread Simon Chopin
** Patch added: "Bionic SRU debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1931994/+attachment/5513255/+files/openssl_bionic.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1931994

Title:
  [Ubuntu 20.04] OpenSSL bugs im s390x AES code

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1931994/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1931994] Re: [Ubuntu 20.04] OpenSSL bugs im s390x AES code

2021-07-23 Thread Simon Chopin
** Patch added: "Hirsute SRU debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1931994/+attachment/5513256/+files/openssl_hirsute.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1931994

Title:
  [Ubuntu 20.04] OpenSSL bugs im s390x AES code

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1931994/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1931994] Re: [Ubuntu 20.04] OpenSSL bugs im s390x AES code

2021-07-23 Thread Simon Chopin
** Patch added: "Impish debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1931994/+attachment/5513257/+files/openssl_impish.debdiff

** Attachment removed: "Standalone C program from the upstream test case"
   
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1931994/+attachment/5513213/+files/evp_extra_test.c

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1931994

Title:
  [Ubuntu 20.04] OpenSSL bugs im s390x AES code

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1931994/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1934995] Re: Broken on ppc64el (toolchain bug?)

2021-07-26 Thread Simon Chopin
Blocks migration to -updates as the fixed mir package FTBFSe.

** Also affects: glibc (Ubuntu)
   Importance: Undecided
   Status: New

** Tags added: update-excuse

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1934995

Title:
  Broken on ppc64el (toolchain bug?)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1934995/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1934995] Re: Broken on ppc64el (toolchain bug?)

2021-07-26 Thread Simon Chopin
Oh, sorry, I know see how my sentence is ambiguous. I meant that the
failing autopkgtests are fixed in the latest version of mir uploaded to
-proposed, but that version fails to build because of this bug. So the
mentioned fix is *not* for this bug.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1934995

Title:
  Broken on ppc64el (toolchain bug?)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1934995/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1931994] Re: [Ubuntu 20.04] OpenSSL bugs im s390x AES code

2021-07-27 Thread Simon Chopin
Regarding the bugproxy test case, it should be disregarded: I was the
one who originally added it, but then found a much smaller and self-
contained test case, and removed the attachment. For some reason,
bugproxy didn't like that.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1931994

Title:
  [Ubuntu 20.04] OpenSSL bugs im s390x AES code

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1931994/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1931994] Re: [Ubuntu 20.04] OpenSSL bugs im s390x AES code

2021-07-27 Thread Simon Chopin
Oh, and thank you very much for the upload, much appreciated :-)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1931994

Title:
  [Ubuntu 20.04] OpenSSL bugs im s390x AES code

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1931994/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928780] Re: [UBUNTU 21.04] openCryptoki: Soft token does not check if an EC key is valid

2021-07-27 Thread Simon Chopin
Hi!

Would it be possible to have a repro case for the fixed bug? I'm not
familiar with the opencryptoki internals, and the checks are introduced
somewhat deep in the call hierarchy from what I can tell.

Thanks in advance,
Cheers,
Simon

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928780

Title:
  [UBUNTU 21.04] openCryptoki: Soft token does not check if an EC key is
  valid

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1928780/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Re: [Bug 1931994] Re: [Ubuntu 20.04] OpenSSL bugs im s390x AES code

2021-07-27 Thread Simon Chopin
The mosquitto test seems to be failing regardless of the version of
openssl, I'll take a look at puma.

On Tue, Jul 27, 2021 at 1:35 PM Gunnar Hjalmarsson <
1931...@bugs.launchpad.net> wrote:

> @Simon: autopkgtest for mosquitto and puma fails on s390x.
>
> https://people.canonical.com/~ubuntu-archive/proposed-
> migration/update_excuses.html#openssl
>
> Please investigate.
>
> --
> You received this bug notification because you are a member of Canonical
> Foundations Team, which is a bug assignee.
> https://bugs.launchpad.net/bugs/1931994
>
> Title:
>   [Ubuntu 20.04] OpenSSL bugs im s390x AES code
>
> Status in Ubuntu on IBM z Systems:
>   In Progress
> Status in openssl package in Ubuntu:
>   Fix Committed
> Status in openssl source package in Bionic:
>   New
> Status in openssl source package in Focal:
>   New
> Status in openssl source package in Hirsute:
>   New
> Status in openssl source package in Impish:
>   Fix Committed
>
> Bug description:
>   Problem description:
>
>   When passing a NULL key to reset AES EVC state, the state wouldn't be
> completely reset on s390x.
>   https://github.com/openssl/openssl/pull/14900
>
>   Solution available here:
>
> https://github.com/openssl/openssl/commit/dc67210d909b5dd7a50f60a96f36f3f5a891b1c8
>
>   Should be applied to all distros where openssl 1.1.1 is included for
> consistency reason.
>   -> 21.10, 20.04, 18.04.
>   I think not needed for 16.04 anymore
>
>   [Test plan]
>
>   $ sudo apt install libssl-dev
>   $ gcc test.c -o evc-test -lcrypto -lssl # See
> https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1931994/comments/2
> for the test.c program
>   $ ./evc-test && echo OK
>
>   [Where problems could occur]
>
>   This patch only touches s390x code paths, so there shouldn't be any
> regression on other architectures. However, on s390x this could reveal
>   latent bugs by spreading a NULL key to new code paths.
>
> To manage notifications about this bug go to:
> https://bugs.launchpad.net/ubuntu-z-systems/+bug/1931994/+subscriptions
>
>

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1931994

Title:
  [Ubuntu 20.04] OpenSSL bugs im s390x AES code

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1931994/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928767] Re: [21.10 FEAT] Upgrade openCryptoki to latest version (3.16+)

2021-07-27 Thread Simon Chopin
** Information type changed from Private to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928767

Title:
  [21.10 FEAT] Upgrade openCryptoki to latest version (3.16+)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1928767/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1931994] Re: [Ubuntu 20.04] OpenSSL bugs im s390x AES code

2021-07-28 Thread Simon Chopin
Thank you, Gunnar!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1931994

Title:
  [Ubuntu 20.04] OpenSSL bugs im s390x AES code

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1931994/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1938268] [NEW] Run the testcases in autopkgtest

2021-07-28 Thread Simon Chopin
Public bug reported:

The upstream tarball ships with some test cases that are supposed to be
run against an installed package. They were removed from the .orig
tarball as they weren't licensed, but that has since been fixed upstream
(mostly, see https://github.com/opencryptoki/opencryptoki/pull/430 for
the last problematic file).

It would be a good thing to run the tests in autopkgtest.

** Affects: opencryptoki (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1938268

Title:
  Run the testcases in autopkgtest

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/opencryptoki/+bug/1938268/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1938268] Re: Run the testcases in autopkgtest

2021-07-28 Thread Simon Chopin
** Tags added: fr-1527

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1938268

Title:
  Run the testcases in autopkgtest

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/opencryptoki/+bug/1938268/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1853271] Re: [21.10 FEAT] Valgrind support for new s390 hardware

2021-07-28 Thread Simon Chopin
Here's a debdiff incorporating the above patchset into our version of
Valgrind

** Information type changed from Private to Public

** Changed in: valgrind (Ubuntu)
   Status: Expired => In Progress

** Changed in: valgrind (Ubuntu)
 Assignee: (unassigned) => Simon Chopin (schopin)

** Patch added: "z15 support debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/valgrind/+bug/1853271/+attachment/5514350/+files/valgrind.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853271

Title:
  [21.10 FEAT] Valgrind support  for new s390 hardware

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1853271/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1853271] Re: [21.10 FEAT] Valgrind support for new s390 hardware

2021-07-28 Thread Simon Chopin
My apologies, it turns out I didn't actually test-build on s390x. After
doing so, the build fails. I have a potential fix, waiting on the build
to finish.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853271

Title:
  [21.10 FEAT] Valgrind support  for new s390 hardware

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1853271/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1853271] Re: [21.10 FEAT] Valgrind support for new s390 hardware

2021-07-28 Thread Simon Chopin
Fixed version (some helper functions and macros were missing)

** Patch added: "valgrind.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/valgrind/+bug/1853271/+attachment/5514357/+files/valgrind.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853271

Title:
  [21.10 FEAT] Valgrind support  for new s390 hardware

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1853271/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928780] Re: [UBUNTU 21.04] openCryptoki: Soft token does not check if an EC key is valid

2021-07-29 Thread Simon Chopin
Here's a debdiff for the Hirsute SRU.

** Patch added: "opencryptoki_hirsute.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/opencryptoki/+bug/1928780/+attachment/5514578/+files/opencryptoki_hirsute.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928780

Title:
  [UBUNTU 21.04] openCryptoki: Soft token does not check if an EC key is
  valid

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1928780/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928780] Re: [UBUNTU 21.04] openCryptoki: Soft token does not check if an EC key is valid

2021-07-29 Thread Simon Chopin
** Description changed:

- The Opencryptoki Soft token does not check if an EC key is valid when an
- EC key is created via C_CreateObject, nor when C_DeriveKey is used with
- ECDH public data. This may allow one to perform Invalid Curve Attacks.
+ [Description]
+ The Opencryptoki Soft token does not check if an EC key is valid when an EC 
key is created via C_CreateObject, nor when C_DeriveKey is used with ECDH 
public data. This may allow one to perform Invalid Curve Attacks.
  
  Fix:
  
https://github.com/opencryptoki/opencryptoki/commit/4e3b43c3d8844402c04a66b55c6c940f965109f0
 (SOFT: Check the EC Key on C_CreateObject and C_DeriveKey)
  
  This commit should apply smooth on top of OCK 3.16.0, but also on OCK
  3.15.0 or 3.15.1.
  
  EC support has been introduced in the Soft token with OCK 3.15.0. So all
  OCK versions >= 3.15.0 are affected. Earlier OCK releases are not
  affected.
  
  This problem need only to be fixed with 21.04 wherer 3.15.1 is included.
+ 
+ [Test Plan]
+ 
+ ??
+ 
+ 
+ [Where problems could occur]
+ 
+ Even assuming the underlying code is perfectly correct, the update
+ increases the API surface of the library slightly, which could provoke
+ namespace clashes where none existed before.
+ 
+ If the EC checking code isn't correct, the soft token implementation
+ might reject some valid keys that would have previously gone through.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928780

Title:
  [UBUNTU 21.04] openCryptoki: Soft token does not check if an EC key is
  valid

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1928780/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928780] Re: [UBUNTU 21.04] openCryptoki: Soft token does not check if an EC key is valid

2021-07-29 Thread Simon Chopin
The backported package is available at the following PPA:
https://launchpad.net/~schopin/+archive/ubuntu/test-
ppa/+sourcepub/12592922/+listing-archive-extra

The version is 3.15.1+dfsg-0ubuntu1.1~ppa2, but it's the same code
otherwise. Waiting for repro before poking someone to upload the SRU
package :)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928780

Title:
  [UBUNTU 21.04] openCryptoki: Soft token does not check if an EC key is
  valid

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1928780/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928780] Re: [UBUNTU 21.04] openCryptoki: Soft token does not check if an EC key is valid

2021-07-30 Thread Simon Chopin
Attached is a standalone version of the test file. I'm having trouble
with my VMs so I won't update the description just yet with steps to
confirm the bug and its fix just yet, but it's looking pretty good.

Small nit with the patch : there's a typo in the name of the function
;-)

** Attachment added: "test.c"
   
https://bugs.launchpad.net/ubuntu/+source/opencryptoki/+bug/1928780/+attachment/5514907/+files/test.c

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928780

Title:
  [UBUNTU 21.04] openCryptoki: Soft token does not check if an EC key is
  valid

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1928780/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1080849] Re: package libchromaprint-tools (not installed) failed to install/upgrade: trying to overwrite '/usr/bin/fpcalc', which is also in package libchromaprint0 0.7-0~ppa1~quantal1

2013-03-03 Thread Simon Chopin
This bug is not in the Ubuntu package but rather in a PPA package,
apparently setup by the upstream author, which conflicts with ours.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1080849

Title:
  package libchromaprint-tools (not installed) failed to
  install/upgrade: trying to overwrite '/usr/bin/fpcalc', which is also
  in package libchromaprint0 0.7-0~ppa1~quantal1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromaprint/+bug/1080849/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1086001] Re: package libchromaprint-tools 0.6-2 crashed after wake from suspend

2013-03-03 Thread Simon Chopin
*** This bug is a duplicate of bug 1080849 ***
https://bugs.launchpad.net/bugs/1080849

** This bug has been marked a duplicate of bug 1080849
   package libchromaprint-tools (not installed) failed to install/upgrade: 
trying to overwrite '/usr/bin/fpcalc', which is also in package libchromaprint0 
0.7-0~ppa1~quantal1

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1086001

Title:
  package libchromaprint-tools 0.6-2 crashed after wake from suspend

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromaprint/+bug/1086001/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1025295] Re: py.test-3 crashed with SIGSEGV in kill()

2012-07-20 Thread Simon Chopin
I've just tried to reproduce this bug on a quantal chroot on my Debian
box, but the test run went absolutely fine. Are you sure you used
pristine pytest or codespeak packages ?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1025295

Title:
  py.test-3 crashed with SIGSEGV in kill()

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pytest/+bug/1025295/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1006709] Re: [MIR] pytest, codespeak-lib

2012-06-14 Thread Simon Chopin
Hi !

I'm the current maintainer of pytest in Debian, and have lend a hand a
couple of times with codespeak-lib as well.

I haven't looked at codespeaklib testsuite yet, but it would not
surprise me that it is intended to be run by pytest, since pytest was
originately part of codespeak-lib and upstream is still the same on both
projects.

I've raised the question of circular build-deps in #debian-mentors, and
it seems to be a very bad idea, because unfortunate circumstances would
force a manual intervention on the buildds if the maintainers both screw
up at approximately the same time.

In our case it actually not such a big problem for Debian since the
arch:all binary packages are all built by the maintainer, but I assume
you guys rebuild every thing, right ?

What I would do is run the test suite using the DEP8 stuff, which is NOT
run at build time and thus is less likely to cause problem. It seems
that you already have some infrastructure in place for it as mentioned
in https://lists.debian.org/debian-devel/2012/06/msg00457.html

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1006709

Title:
  [MIR] pytest, codespeak-lib

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/codespeak-lib/+bug/1006709/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 2080759] [NEW] pristine-tar autopkgtests fail against glibc 2.40-1ubuntu3

2024-09-15 Thread Simon Chopin
Public bug reported:

There are a lot of failures, so here's a link to the full logs instead.


https://objectstorage.prodstack5.canonical.com/swift/v1/AUTH_0f9aae918d5b4744bf7b827671c86842/autopkgtest-oracular/oracular/s390x/p/pristine-tar/20240914_172257_16930@/log.gz

** Affects: glibc (Ubuntu)
 Importance: Critical
 Status: New

** Affects: pristine-tar (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: update-excuse

** Also affects: glibc (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: glibc (Ubuntu)
   Importance: Undecided => Critical

** Changed in: pristine-tar (Ubuntu)
   Importance: Critical => Undecided

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2080759

Title:
  pristine-tar autopkgtests fail against glibc 2.40-1ubuntu3

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/2080759/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1974135] [NEW] Sync libcrypt-openssl-rsa-perl 0.32-2 (main) from Debian unstable (main)

2022-05-19 Thread Simon Chopin
Public bug reported:

Please sync libcrypt-openssl-rsa-perl 0.32-2 (main) from Debian unstable
(main)

The delta is just us being ahead of Debian for the OpenSSL transition,
they've since catched up.

Changelog entries since current kinetic version 0.32-1ubuntu2:

libcrypt-openssl-rsa-perl (0.32-2) unstable; urgency=medium

  * Team upload.

  [ Simon Chopin ]
  * Cherry-pick an OpenSSL fix (LP: #1945798)

 -- gregor herrmann   Thu, 13 Jan 2022 19:55:56 +0100

** Affects: libcrypt-openssl-rsa-perl (Ubuntu)
 Importance: Wishlist
 Status: New

** Changed in: libcrypt-openssl-rsa-perl (Ubuntu)
   Importance: Undecided => Wishlist

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1974135

Title:
  Sync libcrypt-openssl-rsa-perl 0.32-2 (main) from Debian unstable
  (main)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libcrypt-openssl-rsa-perl/+bug/1974135/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Re: [Bug 1947588] Re: Infinite Loop in OpenSSL s_server

2022-05-19 Thread Simon Chopin
Thanks for the follow up! I'll try to fold the fix for this in the next
Jammy SRU, I don't know about other releases yet.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1947588

Title:
  Infinite Loop in OpenSSL s_server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1947588/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1972853] Re: [MIR] lib*-perl

2022-05-20 Thread Simon Chopin
** Description changed:

- TBD
+ [Availability]
+ The packages libxs-parse-sublike-perl, libobject-pad-perl, libindirect-perl, 
libunicode-escape-perl, libunicode-string-perl are already in Ubuntu universe 
and build for the architectures they're designed to work on.
  
- All of those new dependencies are maintained by the Debian Perl Group
- (pkg-perl-maintainers).
+ They currently build and work for the following architectures:
  
- Needed in "main" as new dependencies of licensecheck:
- * libxs-parse-sublike-perl
- * libobject-pad-perl
- * libindirect-perl
+ libxs-parse-sublike-perl: amd64 arm64 armhf ppc64el riscv64 s390x
+ libobject-pad-perl: amd64 arm64 armhf ppc64el riscv64 s390x
+ libindirect-perl: amd64 arm64 armhf ppc64el riscv64 s390x
+ libunicode-string-perl: amd64 arm64 armhf i386 ppc64el riscv64 s390x
+ libunicode-escape-perl: all
  
- and sphinx:
- * libunicode-escape-perl
- * libunicode-string-perl
+ Links to packages:
+ https://launchpad.net/ubuntu/+source/libxs-parse-sublike-perl
+ https://launchpad.net/ubuntu/+source/libobject-pad-perl
+ https://launchpad.net/ubuntu/+source/libindirect-perl
+ https://launchpad.net/ubuntu/+source/libunicode-string-perl
+ https://launchpad.net/ubuntu/+source/libunicode-escape-perl
+ 
+ [Rationale]
+ The packages libxs-parse-sublike-perl, libobject-pad-perl and 
libindirect-perl are required in Ubuntu main as new dependencies of the 
licensecheck (directly or transitively)
+ The packages libunicode-escape-perl and libunicode-string-perl are required 
in Ubuntu main as new dependencies of the sphinx package.
+ 
+ There are no definite deadlines for this MIR.
+ 
+ [Security]
+ libxs-parse-sublike-perl: I couldn't find any security issue for this package 
in the past.
+ libobject-pad-perl: I couldn't find any security issue for this package in 
the past.
+ libindirect-perl: I couldn't find any security issue for this package in the 
past.
+ libunicode-string-perl: I couldn't find any security issue for this package 
in the past.
+ libunicode-escape-perl: I couldn't find any security issue for this package 
in the past.
+ 
+ All packages only ship Perl binary extensions or source modules, along
+ with documentation. There are no binaries, services, recurring jobs.
+ 
+ 
+ [Quality assurance - function/usage]
+ The packages can be correctly imported in a Perl script after installation.
+ 
+ [Quality assurance - maintenance]
+ The packages are maintainted well in Debian, as they are under the umbrella 
of the Perl team.
+ Most don't have any open bugs:
+ 
+ https://bugs.debian.org/src:libindirect-perl
+ https://bugs.launchpad.net/ubuntu/+source/libindirect-perl/+bug
+ https://bugs.debian.org/src:libunicode-escape-perl
+ https://bugs.launchpad.net/ubuntu/+source/libunicode-escape-perl/+bug
+ https://bugs.debian.org/src:libunicode-string-perl
+ https://bugs.launchpad.net/ubuntu/+source/libunicode-string-perl/+bug
+ https://bugs.debian.org/src:libxs-parse-sublike-perl
+ https://bugs.launchpad.net/ubuntu/+source/libxs-parse-sublike-perl/+bug
+ 
+ The libobject-pad-perl package has one bug opened:
+ 
+ https://bugs.launchpad.net/ubuntu/+source/libobject-pad-perl/+bug
+ https://bugs.debian.org/src:libobject-pad-perl
+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1006658
+ 
+ The issue described in the bug doesn't seem to be triggered by the test
+ suite anymore.
+ 
+ [Quality assurance - testing]
+ 
+ The packages all include a test suite that is run both at runtime and as
+ autopkgtests.
+ 
+ [Quality assurance - packaging]
+ ALl packages has watchfiles that work.
+ 
+ They appear relatively lintian-clean, with some more warnings to the
+ libunicode* packages due to the packaging not having been refreshed in a 
while.
+ 
+ None of them have any overrides.
+ 
+ Link to the Lintian runs on Debian (relevant as there are no Ubuntu
+ delta):
+ 
+ https://lintian.debian.org/sources/libindirect-perl
+ https://lintian.debian.org/sources/libxs-parse-sublike-perl
+ https://lintian.debian.org/sources/libobject-pad-perl
+ https://lintian.debian.org/sources/libunicode-string-perl
+ https://lintian.debian.org/sources/libunicode-escape-perl
+ 
+ These packages do not rely on obsolete or about to be demoted packages.
+ These packages have no python2 or GTK2 dependencies
+ 
+ The packages will not be installed by default
+ 
+ Packaging and build are easy:
+ 
https://salsa.debian.org/perl-team/modules/packages/libindirect-perl/-/blob/master/debian/rules
+ 
https://salsa.debian.org/perl-team/modules/packages/libxs-parse-sublike-perl/-/blob/master/debian/rules
+ 
https://salsa.debian.org/perl-team/modules/packages/libobject-pad-perl/-/blob/master/debian/rules
+ 
https://salsa.debian.org/perl-team/modules/packages/libunicode-string-perl/-/blob/master/debian/rules
+ 
+ The packaging for libunicode-escape-perl is a bit outdated:
+ 
https://salsa.debian.org/perl-team/modules/packages/libunicode-escape-perl/-/blob/master/debian/rules
+ 
+ [UI standards]
+ These are not applications but r

[Bug 1975347] Re: Backport OPENSSL_strcasecmp fixes from 3.0 branch

2022-05-23 Thread Simon Chopin
I *think* this is a duplicate of
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1974037 but I'll
keep it separate for now as the API used to trigger the issue isn't the
same.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975347

Title:
  Backport OPENSSL_strcasecmp fixes from 3.0 branch

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1975347/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1975347] Re: Backport OPENSSL_strcasecmp fixes from 3.0 branch

2022-05-23 Thread Simon Chopin
*** This bug is a duplicate of bug 1974037 ***
https://bugs.launchpad.net/bugs/1974037

** This bug has been marked a duplicate of bug 1974037
   openssl: EVP_EC_gen() segfault without init

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975347

Title:
  Backport OPENSSL_strcasecmp fixes from 3.0 branch

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1975347/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1971650] Re: wrong check for "server" in libssl3.postinst

2022-05-23 Thread Simon Chopin
FWIW, Debian just scrapped the postinst entirely, advising users to use
needrestart or checkrestart instead.

In my upcoming merge I'll revert the deletion, but I'd be happy to go
back and remove that part of the delta once I understand how all the
pieces fit together.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971650

Title:
  wrong check for "server" in libssl3.postinst

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1971650/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1974035] Re: openssl: Merge 3.0.3-4 from Debian unstable

2022-05-23 Thread Simon Chopin
Here's a MP using git-ubuntu (well, with a lot of manual fiddling):

https://code.launchpad.net/~schopin/ubuntu/+source/openssl/+git/openssl/+merge/423153

I'd appreciate it the upload would be using rich history support:
https://lists.ubuntu.com/archives/ubuntu-devel/2021-October/041649.html
as the delta is fairly substantial, this would make future merges
probably easier.

** Merge proposal linked:
   
https://code.launchpad.net/~schopin/ubuntu/+source/openssl/+git/openssl/+merge/423153

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1974035

Title:
  openssl: Merge 3.0.3-4 from Debian unstable

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1974035/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1974037] Re: openssl: EVP_EC_gen() segfault without init

2022-05-23 Thread Simon Chopin
** Merge proposal linked:
   
https://code.launchpad.net/~schopin/ubuntu/+source/openssl/+git/openssl/+merge/423153

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1974037

Title:
  openssl: EVP_EC_gen() segfault without init

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1974037/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1973041] Re: llvm-toolchain-13: please backport Risc-V .insn directive support

2022-05-23 Thread Simon Chopin
Here's a merge of llvm-toolchain-13 that includes this patch, along with
another one for https://bugs.launchpad.net/ubuntu/+source/llvm-
toolchain-13/+bug/1973041

Build in progress there:

https://launchpad.net/~schopin/+archive/ubuntu/rustc-1.59/+sourcepub/13636485/+listing-
archive-extra

** Patch added: "llvm-13.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/llvm-toolchain-13/+bug/1973041/+attachment/5592302/+files/llvm-13.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1973041

Title:
  llvm-toolchain-13: please backport Risc-V .insn directive support

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/llvm-toolchain-13/+bug/1973041/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1974037] Re: openssl: EVP_EC_gen() segfault without init

2022-05-24 Thread Simon Chopin
** Changed in: openssl (Ubuntu Kinetic)
   Status: Confirmed => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1974037

Title:
  openssl: EVP_EC_gen() segfault without init

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1974037/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1974037] Re: openssl: EVP_EC_gen() segfault without init

2022-05-24 Thread Simon Chopin
Attached is a debdiff for the Jammy changes. I'm still working on
Kinetic as this will be folded into the merge, but I still need to do
some more work as some new patches have surfaced upstream since then, as
well as a new Debian revision. I feel the Jammy SRU should still move
forward.

Note that the patchset is consequent as upstream has changed their
approach to the issue a couple of times, now settling into
reimplementing the string comparison functions entirely rather than
relying on a C locale. This last approach has the benefit of not
requiring initialization, which seems to have been the cause of all the
regressions observed so far with the first solution.

The patches for that last approach haven't made their way to Debian yet,
AFAICT.

** Patch added: "openssl.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1974037/+attachment/5592652/+files/openssl.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1974037

Title:
  openssl: EVP_EC_gen() segfault without init

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1974037/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1974037] Re: openssl: EVP_EC_gen() segfault without init

2022-05-24 Thread Simon Chopin
** Description changed:

- Imported from Debian bug http://bugs.debian.org/1010958:
+ [Impact]
+ 
+ The fix for
+ https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1968997 has
+ broken some code paths as the new string comparison functions now need
+ initialization, triggering segafults.
+ 
+ The provided debdiff fixes the immediate issue and also settles on a new
+ implementation not requiring the initialization in the first place.
+ 
+ [Test Plan]
+ 
+ Since this is a regression fix, we first need to check that the original
+ bug hasn't cropped up again:
+ 
+ sudo locale-gen tr_TR.UTF-8
+ LANG=C curl https://ubuntu.com/ > /dev/null # This work
+ LANG=tr_TF.UTF-8 curl https://ubuntu.com/ > /dev/null # This should work as 
well
+ 
+ For the regression itself:
+ 
+ sudo apt install libssl-dev
+ cat < openssl_test.c
+ #include 
+ int main()
+ {
+ EVP_PKEY_Q_keygen(NULL, NULL, "EC", "P-256");
+ }
+ EOF
+ gcc openssl_test.c -lcrypto -lssl -o openssl_test
+ ./openssl_test
+ 
+ 
+ [Where problems could occur]
+ 
+ This new patch set is relatively massive, on top of another massive one.
+ Some new regressions could crop up of a similar kind. Furthermore, the
+ homegrown string comparison function could be buggy, leading to algorithm 
name mismatches.
+ 
+ [Other info]
+ 
+ The patches all come from upstream and have been merged on their 3.0
+ maintenance branch.
+ 
+ [Original report]
  
  Source: sscg
  Version: 3.0.2-1
  Severity: serious
  Tags: ftbfs
  
  https://buildd.debian.org/status/logs.php?pkg=sscg&ver=3.0.2-1%2Bb1
  
  ...
   1/10 generate_rsa_key_test FAIL  0.01s   killed by signal 11 
SIGSEGV
  04:32:21 MALLOC_PERTURB_=87 
/<>/obj-x86_64-linux-gnu/generate_rsa_key_test
  ...
  
  Summary of Failures:
  
   1/10 generate_rsa_key_test FAIL  0.01s   killed by signal
  11 SIGSEGV
  
  Ok: 9
  Expected Fail:  0
  Fail:   1
  Unexpected Pass:0
  Skipped:0
  Timeout:0
  dh_auto_test: error: cd obj-x86_64-linux-gnu && LC_ALL=C.UTF-8 
MESON_TESTTHREADS=4 ninja test returned exit code 1
  make: *** [debian/rules:6: binary-arch] Error 25
  
  This has also been reported on the openssl-users mailing list:
  
  https://www.mail-archive.com/openssl-users@openssl.org/msg90830.html

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1974037

Title:
  openssl: EVP_EC_gen() segfault without init

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1974037/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1973041] Re: llvm-toolchain-13: please backport Risc-V .insn directive support

2022-05-25 Thread Simon Chopin
Refreshed version of the same thing, with the merge fixed, adding
Replaces/Breaks fields due to the Ubuntu/Debian divergence on which
package ships the new static libraries.

I used the dh-exec mechanism for the i386 exception as it is what is
used in the current Salsa 13 branch for their grpc-unable architectures,
thus it'll eventually reduce the delta.

The .insn patch has been forwarded to Debian:
https://salsa.debian.org/pkg-llvm-team/llvm-
toolchain/-/merge_requests/89

** Patch added: "llvm-13.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/llvm-toolchain-13/+bug/1973041/+attachment/5592872/+files/llvm-13.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1973041

Title:
  llvm-toolchain-13: please backport Risc-V .insn directive support

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/llvm-toolchain-13/+bug/1973041/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1971128] Re: z3 is incorrectly marked as a MIR candidate

2022-05-30 Thread Simon Chopin
** Summary changed:

- [MIR] z3
+ z3 is incorrectly marked as a MIR candidate

** Description changed:

- TDB by foundations.
+ rustc pulls llvm-13 into main (the llvm-toolchain-13 being already
+ partially seeded, it doesn't raise any issue), and z3 is a dependency of
+ it.

** Also affects: rustc (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971128

Title:
  z3 is incorrectly marked as a MIR candidate

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/rustc/+bug/1971128/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1971128] Re: z3 is incorrectly marked as a MIR candidate

2022-05-30 Thread Simon Chopin
Since we're shipping rustc primarily as a packaging tool, we can simply
demote the llvm-13 Recommends to a Suggests, and instead add it to rust-
all (which is in universe)

** Also affects: z3 (Ubuntu Kinetic)
   Importance: Undecided
   Status: Incomplete

** Also affects: rustc (Ubuntu Kinetic)
   Importance: Undecided
   Status: New

** Also affects: z3 (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Also affects: rustc (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Changed in: z3 (Ubuntu Kinetic)
   Importance: Undecided => High

** Changed in: rustc (Ubuntu Kinetic)
   Importance: Undecided => High

** Changed in: rustc (Ubuntu Jammy)
   Importance: Undecided => Medium

** Changed in: z3 (Ubuntu Jammy)
   Importance: Undecided => Medium

** Changed in: z3 (Ubuntu Jammy)
   Status: New => Invalid

** Changed in: z3 (Ubuntu Kinetic)
   Status: Incomplete => Invalid

** Changed in: rustc (Ubuntu Jammy)
   Status: New => Confirmed

** Changed in: rustc (Ubuntu Kinetic)
   Status: New => Confirmed

** Changed in: rustc (Ubuntu Jammy)
     Assignee: (unassigned) => Simon Chopin (schopin)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971128

Title:
  z3 is incorrectly marked as a MIR candidate

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/rustc/+bug/1971128/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1972056] Re: [openssl3] please sync openssl.cnf to ease changing security level

2022-05-30 Thread Simon Chopin
** Description changed:

- openssl.cnf as provided misses some directive, which make it a bit
- difficult to change security level, which since openssl 3 disables SHA1
- signatures.
+ [Impact]
+ 
+ The OpenSSL 3.0 lead to a lot of broken setups. Some of them are
+ regressions, but others are simply broken due to the use of outdated
+ algorithms, such as SHA-1 signature on certificates. Changing the
+ security level is a common action to identify and work around such
+ cases, and as such the user should be able to change it easily  in the
+ default config file.
+ 
+ The fix is to partially revert our delta that ignored a Debian patch:
+ instead of ignoring the patch entirely, we modify it to only affect the
+ default configuration file, and in a way that matches our patchset.
+ Using this approach will allow us to pick up on Debian's changes more
+ easily during subsequent merges.
+ 
+ [Test Plan]
+ 
+ To easily check that the setting is taken into account, one can use
+ 'openssl ciphers -s'
+ 
+ $ openssl ciphers -v -s | wc -l # Uses the default value
+ 30
+ $ openssl ciphers -v -s 'DEFAULT:@SECLEVEL=2' | wc -l
+ 30
+ $ openssl ciphers -v -s 'DEFAULT:@SECLEVEL=3' | wc -l
+ 24
+ $ vim /etc/ssl/openssl.cf # edit the config file to bump the seclevel to 3
+ $ openssl ciphers -v -s | wc -l # Uses the new value from the config file
+ 24
+ 
+ [Where problems could occur]
+ 
+ The changes could break the overall configuration of OpenSSL!
+ 
+ [Origin report]
+ openssl.cnf as provided misses some directive, which make it a bit difficult 
to change security level, which since openssl 3 disables SHA1 signatures.
  
  See also this Debian bug https://bugs.debian.org/cgi-
  bin/bugreport.cgi?bug=1010360 and the committed fix:
  
https://salsa.debian.org/debian/openssl/-/commit/b507914c40270e32cde6afcc8af93707c225e7f4
  
  Can you please sync this change in Ubuntu openssl?
  
  This way one should just add a single directive to change the security
  level.
  
  Thanks.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1972056

Title:
  [openssl3] please sync openssl.cnf to ease changing security level

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1972056/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1971128] Re: z3 is incorrectly marked as a MIR candidate

2022-05-30 Thread Simon Chopin
** Patch added: "rustc.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/rustc/+bug/1971128/+attachment/5593815/+files/rustc.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971128

Title:
  z3 is incorrectly marked as a MIR candidate

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/rustc/+bug/1971128/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1947588] Re: Infinite Loop in OpenSSL s_server

2022-05-30 Thread Simon Chopin
** Description changed:

+ [Impact]
+ 
+ The TLS test server `openssl s_server` can very easily be led into an
+ infinite loop if configured with incompatible settings and used via
+ DTLS. This makes it harder to test one's TLS configuration.
+ 
+ [Test plan]
+ 
+ In one session:
+ $ openssl s_server -nocert -psk 01020304 -dtls1
+ In parallel:
+ $ openssl s_client -dtls1 -psk 01020304
+ 
+ The server session will enter an infinite loop:
+ Using default temp DH parameters
+ ACCEPT
+ ERROR
+ 140247926990208:error:141FC044:SSL routines:tls_setup_handshake:internal 
error:../ssl/statem/statem_lib.c:109:
+ ERROR
+ 140247926990208:error:141FC044:SSL routines:tls_setup_handshake:internal 
error:../ssl/statem/statem_lib.c:109:
+ ERROR
+ ... etc...
+ 
+ [Where problems could occur]
+ 
+ The patch is fairly self-contained, so regressions should only occur in
+ the `openssl s_server` application, and not in the libssl or libcrypto
+ libraries.
+ However, the patch could break said server, which might be used in e.g.
+ autopkgtests.
+ 
+ [Original report]
  Launching openssl s_server as follows:
  
  $ openssl s_server -nocert -psk 01020304 -dtls1
  
  And using openssl s_client to connect to it like this:
  
  $ openssl s_client -dtls1 -psk 01020304
  
  Results in s_server entering an infinite loop:
- 
  
  Using default temp DH parameters
  ACCEPT
  ERROR
  140247926990208:error:141FC044:SSL routines:tls_setup_handshake:internal 
error:../ssl/statem/statem_lib.c:109:
  ERROR
  140247926990208:error:141FC044:SSL routines:tls_setup_handshake:internal 
error:../ssl/statem/statem_lib.c:109:
  ERROR
  
  ...and so on...
  
  I have confirmed that upstream OpenSSL does not have this issue in a
  default build of 1.1.1j or 1.1.1k. Upstream 1.1.1l has a different bug
  with these commands (https://github.com/openssl/openssl/issues/16707)
  and it was while working on the fix for that issue
  (https://github.com/openssl/openssl/pull/16838) that I noticed this
  problem in the Ubuntu packages.
  
  $ lsb_release -rd
- Description:  Ubuntu 21.04
- Release:  21.04
+ Description: Ubuntu 21.04
+ Release: 21.04
  
  $ apt-cache policy openssl
  openssl:
Installed: 1.1.1j-1ubuntu3.5
Candidate: 1.1.1j-1ubuntu3.5
Version table:
   *** 1.1.1j-1ubuntu3.5 500
  500 http://gb.archive.ubuntu.com/ubuntu hirsute-updates/main amd64 
Packages
  500 http://security.ubuntu.com/ubuntu hirsute-security/main amd64 
Packages
  100 /var/lib/dpkg/status
   1.1.1j-1ubuntu3 500
  500 http://gb.archive.ubuntu.com/ubuntu hirsute/main amd64 Packages
  
  $ openssl version -a
- OpenSSL 1.1.1j  16 Feb 2021
+ OpenSSL 1.1.1j 16 Feb 2021
  built on: Mon Aug 23 17:02:39 2021 UTC
  platform: debian-amd64
- options:  bn(64,64) rc4(16x,int) des(int) blowfish(ptr) 
+ options: bn(64,64) rc4(16x,int) des(int) blowfish(ptr)
  compiler: gcc -fPIC -pthread -m64 -Wa,--noexecstack -Wall -Wa,--noexecstack 
-g -O2 -ffile-prefix-map=/build/openssl-5U8yxE/openssl-1.1.1j=. -flto=auto 
-ffat-lto-objects -fstack-protector-strong -Wformat -Werror=format-security 
-DOPENSSL_TLS_SECURITY_LEVEL=2 -DOPENSSL_USE_NODELETE -DL_ENDIAN -DOPENSSL_PIC 
-DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT 
-DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM 
-DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM 
-DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM -DNDEBUG -Wdate-time 
-D_FORTIFY_SOURCE=2
  OPENSSLDIR: "/usr/lib/ssl"
  ENGINESDIR: "/usr/lib/x86_64-linux-gnu/engines-1.1"
  Seeding source: os-specific

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1947588

Title:
  Infinite Loop in OpenSSL s_server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1947588/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1976295] [NEW] astroquery: Autopkgtests failure due to trying to write to /usr/lib

2022-05-30 Thread Simon Chopin
Public bug reported:

Imported from Debian bug http://bugs.debian.org/1012125:

Source: astroquery
Version: 0.4.6+dfsg-2
Severity: serious
Justification: RT
X-Debbugs-Cc: simon.cho...@canonical.com

Hi,

The autopkgtests for 0.4.6+dfsg-2 fail with attempts to write to
locations in /usr/lib, preventing the package from migrating to testing.

From
https://ci.debian.net/data/autopkgtest/unstable/amd64/a/astroquery/21778465/log.gz
:

=== short test summary info 
FAILED 
../../../../usr/lib/python3/dist-packages/astroquery/esa/hubble/tests/test_esa_hubble.py::TestESAHubble::test_download_product_by_calibration
FAILED 
../../../../usr/lib/python3/dist-packages/astroquery/esa/hubble/tests/test_esa_hubble.py::TestESAHubble::test_download_product_by_product_type
FAILED 
../../../../usr/lib/python3/dist-packages/astroquery/esa/hubble/tests/test_esa_hubble.py::TestESAHubble::test_get_postcard
FAILED 
../../../../usr/lib/python3/dist-packages/astroquery/esa/hubble/tests/test_esa_hubble.py::TestESAHubble::test_cone_search
FAILED 
../../../../usr/lib/python3/dist-packages/astroquery/esa/hubble/tests/test_esa_hubble.py::TestESAHubble::test_cone_search_coords
FAILED 
../../../../usr/lib/python3/dist-packages/astroquery/esa/hubble/tests/test_esa_hubble.py::TestESAHubble::test_get_artifact
= 6 failed, 973 passed, 588 skipped, 2 xfailed, 150 warnings in 53.54s =

Details of the first failure:

__ TestESAHubble.test_download_product_by_calibration
__

self = 

def test_download_product_by_calibration(self):
parameters = {'observation_id': "J6FL25S4Q",
  'cal_level': "RAW",
  'filename': "J6FL25S4Q.vot",
  'verbose': True}
ehst = ESAHubbleClass(self.get_dummy_tap_handler())
>   ehst.download_product(observation_id=parameters['observation_id'],
  calibration_level=parameters['cal_level'],
  filename=parameters['filename'],
  verbose=parameters['verbose'])

/usr/lib/python3/dist-packages/astroquery/esa/hubble/tests/test_esa_hubble.py:101:
 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
/usr/lib/python3/dist-packages/astroquery/esa/hubble/core.py:106: in 
download_product
response = self._request('GET', self.data_url, save=True, cache=True,
/usr/lib/python3/dist-packages/astroquery/esa/hubble/tests/test_esa_hubble.py:39:
 in get_mockreturn
shutil.copy(response + '.test', response)
/usr/lib/python3.10/shutil.py:417: in copy
copyfile(src, dst, follow_symlinks=follow_symlinks)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

src = 
'/usr/lib/python3/dist-packages/astroquery/esa/hubble/tests/data/J6FL25S4Q.vot.test'
dst = 
'/usr/lib/python3/dist-packages/astroquery/esa/hubble/tests/data/J6FL25S4Q.vot'
[snip]
with open(src, 'rb') as fsrc:
try:
>   with open(dst, 'wb') as fdst:
E   PermissionError: [Errno 13] Permission denied: 
'/usr/lib/python3/dist-packages/astroquery/esa/hubble/tests/data/J6FL25S4Q.vot'

/usr/lib/python3.10/shutil.py:256: PermissionError

** Affects: astroquery (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: astroquery (Debian)
 Importance: Undecided
 Status: New


** Tags: update-excuse

** Bug watch added: Debian Bug tracker #1012125
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012125

** Changed in: astroquery (Debian)
 Remote watch: None => Debian Bug tracker #1012125

** Tags added: update-excuse

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1976295

Title:
  astroquery: Autopkgtests failure due to trying to write to /usr/lib

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/astroquery/+bug/1976295/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1976299] Re: hashlib.algorithms_available lists algorithms that cannot be used

2022-05-31 Thread Simon Chopin
** Tags added: transition-openssl3-jj

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1976299

Title:
  hashlib.algorithms_available lists algorithms that cannot be used

To manage notifications about this bug go to:
https://bugs.launchpad.net/python3/+bug/1976299/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1976464] [NEW] ruby-tty-screen: Autopkgtests fail on s390x

2022-06-01 Thread Simon Chopin
Public bug reported:

Imported from Debian bug http://bugs.debian.org/1012204:

Source: ruby-tty-screen
Version: 0.7.1-2
Severity: normal
X-Debbugs-Cc: scho...@ubuntu.com

Hi,

The autopkgtests for this package fail on s390x, apparently due to an
endianness issue. See
https://ci.debian.net/data/autopkgtest/unstable/armhf/r/racket-mode/21881667/log.gz

There's a patch available upstream:

https://github.com/piotrmurach/tty-
screen/commit/dba351b178ae06b56985cc77a291918a0fc4aff4

I intend to post a Salsa MR to fix the issue.

** Affects: ruby-tty-screen (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: ruby-tty-screen (Debian)
 Importance: Undecided
 Status: New


** Tags: update-excuse

** Bug watch added: Debian Bug tracker #1012204
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012204

** Changed in: ruby-tty-screen (Debian)
 Remote watch: None => Debian Bug tracker #1012204

** Tags added: update-excuse

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1976464

Title:
  ruby-tty-screen: Autopkgtests fail on s390x

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ruby-tty-screen/+bug/1976464/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1976464] Re: ruby-tty-screen: Autopkgtests fail on s390x

2022-06-02 Thread Simon Chopin
*** This bug is a duplicate of bug 1968831 ***
https://bugs.launchpad.net/bugs/1968831

** This bug has been marked a duplicate of bug 1968831
   ruby-tty-screen: endianness bug detected by autopkgtest

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1976464

Title:
  ruby-tty-screen: Autopkgtests fail on s390x

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ruby-tty-screen/+bug/1976464/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1976610] [NEW] ruby-gitlab-fog-azure-rm: FTBFS with ruby3.0: ERROR: Test "ruby3.0" failed: ArgumentError: tried to create Proc object without a block

2022-06-02 Thread Simon Chopin
Public bug reported:

Imported from Debian bug http://bugs.debian.org/996235:

[,
]

** Affects: ruby-gitlab-fog-azure-rm (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: ruby-gitlab-fog-azure-rm (Debian)
 Importance: Undecided
 Status: New


** Tags: update-excuse

** Bug watch added: Debian Bug tracker #996235
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996235

** Changed in: ruby-gitlab-fog-azure-rm (Debian)
 Remote watch: None => Debian Bug tracker #996235

** Tags added: update-excuse

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1976610

Title:
  ruby-gitlab-fog-azure-rm: FTBFS with ruby3.0: ERROR: Test "ruby3.0"
  failed: ArgumentError: tried to create Proc object without a block

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ruby-gitlab-fog-azure-rm/+bug/1976610/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1976622] [NEW] libisal: FTBFS on big-endian architectures

2022-06-02 Thread Simon Chopin
Public bug reported:

Imported from Debian bug http://bugs.debian.org/1012262:

Source: libisal
Version: 2.30.0-4
Severity: normal
X-Debbugs-Cc: scho...@ubuntu.com

This package fails to build on big-endian architectures, notably s390x.

There's a fix available upstream:
https://github.com/intel/isa-l/commit/d3cfb2fb772e375cf2007e484e0a6ec0c6a7c993

** Affects: fastp (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: libisal (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: libisal (Debian)
 Importance: Undecided
 Status: New


** Tags: update-excuse

** Bug watch added: Debian Bug tracker #1012262
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012262

** Changed in: libisal (Debian)
 Remote watch: None => Debian Bug tracker #1012262

** Also affects: fastp (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: fastp (Ubuntu)
   Status: New => Invalid

** Tags added: update-excuse

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1976622

Title:
  libisal: FTBFS on big-endian architectures

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/fastp/+bug/1976622/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1976622] Re: libisal: FTBFS on big-endian architectures

2022-06-02 Thread Simon Chopin
Adding fastp to the affected packages as this blocks its transition from
-proposed.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1976622

Title:
  libisal: FTBFS on big-endian architectures

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/fastp/+bug/1976622/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1971128] Re: z3 is incorrectly marked as a MIR candidate

2022-06-02 Thread Simon Chopin
The chain is rustc -> llvm-13 -> llvm-13-dev -> z3, so that's still an
issue with Jammy, I think. Reopening :)

** Changed in: rustc (Ubuntu Jammy)
   Status: Invalid => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971128

Title:
  z3 is incorrectly marked as a MIR candidate

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/rustc/+bug/1971128/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071789] [NEW] rust-reqwest: some tests fail when a proxy is set

2024-07-03 Thread Simon Chopin
Public bug reported:

The following tests started failing in the Ubuntu autopkgtest
environment, most likely due to the proxy.

30927s overridden_dns_resolution_with_gai
30927s overridden_dns_resolution_with_gai_multiple
30927s overridden_dns_resolution_with_hickory_dns
30927s overridden_dns_resolution_with_hickory_dns_multiple

It's presumably an upstream regression, and/or a proxy bug, but coming
up with an upstream fix is probably too involved for me to handle, so
I'll just skip the tests instead.

** Affects: rust-reqwest (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: update-excuse

** Description changed:

- The following tests fail in the Ubuntu  autopkgtest environment, due to
- the proxy.
+ The following tests started failing in the Ubuntu autopkgtest
+ environment, most likely due to the proxy.
  
  30927s overridden_dns_resolution_with_gai
  30927s overridden_dns_resolution_with_gai_multiple
  30927s overridden_dns_resolution_with_hickory_dns
  30927s overridden_dns_resolution_with_hickory_dns_multiple
  
- It's presumably an upstream bug, and/or a proxy bug, but coming up with
- an upstream fix is probably too involved for me to handle, so I'll just
- skip the tests instead.
+ It's presumably an upstream regression, and/or a proxy bug, but coming
+ up with an upstream fix is probably too involved for me to handle, so
+ I'll just skip the tests instead.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071789

Title:
  rust-reqwest: some tests fail when a proxy is set

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/rust-reqwest/+bug/2071789/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071789] Re: rust-reqwest: some tests fail when a proxy is set

2024-07-03 Thread Simon Chopin
After a bit more investigation, the tests actually *always* failed,
except once, maybe because the random port chosen happened to match some
whitelist or something? In any case, the tests are likely *not* supposed
to work.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071789

Title:
  rust-reqwest: some tests fail when a proxy is set

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/rust-reqwest/+bug/2071789/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2068543] Re: Config variable $nrconf{restart} is no longer accurate: it always restarts

2024-07-04 Thread Simon Chopin
** Changed in: needrestart (Ubuntu Noble)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068543

Title:
  Config variable $nrconf{restart} is no longer accurate: it always
  restarts

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/needrestart/+bug/2068543/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067800] Re: needrestart should avoid restarting runner-provisioner.service

2024-07-04 Thread Simon Chopin
This fix will wait until the current SRU gets through the door.

** Changed in: needrestart (Ubuntu Noble)
   Status: New => In Progress

** Changed in: needrestart (Ubuntu Noble)
   Status: In Progress => Triaged

** Changed in: needrestart (Ubuntu Noble)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067800

Title:
  needrestart should avoid restarting runner-provisioner.service

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/needrestart/+bug/2067800/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2063200] Re: useradd --extrausers --groups tries to lock /etc/group

2024-07-04 Thread Simon Chopin
Reverting the tag while waiting for verification from the Core team
(pinged out of band)

** Tags removed: verification-done-noble
** Tags added: verification-needed-noble

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063200

Title:
  useradd --extrausers --groups tries to lock /etc/group

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/2063200/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072342] [NEW] giada FTBFS with RtAudio 6

2024-07-05 Thread Simon Chopin
Public bug reported:

Imported from Debian bug http://bugs.debian.org/1073997:

Source: giada
Version: 0.22.0-4
Severity: serious
Tags: ftbfs

https://buildd.debian.org/status/logs.php?pkg=giada&ver=0.22.0-4%2Bb2

...
/<>/src/core/kernelAudio.cpp: In member function ‘int 
giada::m::KernelAudio::openDevice(const giada::m::Conf::Data&)’:
/<>/src/core/kernelAudio.cpp:182:16: error: ‘RtAudioError’ does 
not name a type; did you mean ‘RtAudioErrorType’?
  182 | catch (RtAudioError& e)
  |^~~~
  |RtAudioErrorType
...

** Affects: giada (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: giada (Debian)
 Importance: Undecided
 Status: New


** Tags: ftbfs update-excuse

** Bug watch added: Debian Bug tracker #1073997
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1073997

** Changed in: giada (Debian)
 Remote watch: None => Debian Bug tracker #1073997

** Tags added: ftbfs update-excuse

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072342

Title:
  giada FTBFS with RtAudio 6

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/giada/+bug/2072342/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072342] Re: giada FTBFS with RtAudio 6

2024-07-08 Thread Simon Chopin
I'll have to stop the investigation on this, but with the attached
debdiff I managed to move the build forward, it now fails with:

/usr/bin/ld: 
CMakeFiles/giada.dir/src/deps/juce/modules/juce_core/juce_core.cpp.o: warning: 
relocation against `_ZN4juce20juce_compilationTimeE' in read-only section 
`.text'
/usr/bin/ld: 
CMakeFiles/giada.dir/src/deps/juce/modules/juce_core/juce_core.cpp.o: in 
function `juce::StringArray::addTokens(juce::StringRef, bool)':
/usr/src/giada-0.22.0-4build3/src/deps/juce/modules/juce_core/text/juce_StringArray.cpp:343:(.text+0xa9dc0):
 undefined reference to `juce::juce_compilationDate'
/usr/bin/ld: 
CMakeFiles/giada.dir/src/deps/juce/modules/juce_core/juce_core.cpp.o: in 
function `juce::Time::getCompilationDate()':
/usr/src/giada-0.22.0-4build3/src/deps/juce/modules/juce_core/time/juce_Time.cpp:616:(.text+0xa9e13):
 undefined reference to `juce::juce_compilationTime'
/usr/bin/ld: warning: creating DT_TEXTREL in a PIE


** Patch added: "giada.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/giada/+bug/2072342/+attachment/5795390/+files/giada.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072342

Title:
  giada FTBFS with RtAudio 6

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/giada/+bug/2072342/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072472] [NEW] mescc-tools FTBFS on ppc64el

2024-07-08 Thread Simon Chopin
Public bug reported:

mescc-tools fails to build on ppc64el with the following error:

test/test13/hello.sh
+ ./bin/M1 --little-endian --architecture ppc64le -f test/test13/hello.M1 -o 
test/test13/hello.hex2
+ ./bin/hex2 --little-endian --architecture ppc64le --base-address 0x1 -f 
elf_headers/elf64-PPC64LE.hex2 -f test/test13/hello.hex2 -o 
test/results/test13-binary
+ ./bin/get_machine
+ [ ppc64le = ppc64le ]
+ ./bin/get_machine --os
+ [ Linux = Linux ]
+ ./test/results/test13-binary
Illegal instruction (core dumped)
+ [ 132 = 42 ]
+ exit 3
make[1]: *** [makefile:145: test13-binary] Error 3

The package builds fine in Debian on the same arch.

** Affects: mescc-tools (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: ftbfs update-excuse

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072472

Title:
  mescc-tools FTBFS on ppc64el

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mescc-tools/+bug/2072472/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072472] Re: mescc-tools FTBFS on ppc64el

2024-07-08 Thread Simon Chopin
** Description changed:

  mescc-tools fails to build on ppc64el with the following error:
  
  test/test13/hello.sh
  + ./bin/M1 --little-endian --architecture ppc64le -f test/test13/hello.M1 -o 
test/test13/hello.hex2
  + ./bin/hex2 --little-endian --architecture ppc64le --base-address 0x1 -f 
elf_headers/elf64-PPC64LE.hex2 -f test/test13/hello.hex2 -o 
test/results/test13-binary
  + ./bin/get_machine
  + [ ppc64le = ppc64le ]
  + ./bin/get_machine --os
  + [ Linux = Linux ]
  + ./test/results/test13-binary
  Illegal instruction (core dumped)
  + [ 132 = 42 ]
  + exit 3
  make[1]: *** [makefile:145: test13-binary] Error 3
+ 
+ The package builds fine in Debian on the same arch.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072472

Title:
  mescc-tools FTBFS on ppc64el

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mescc-tools/+bug/2072472/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072649] [NEW] glibc 2.39-3.1ubuntu2 breaks i386 feature detection (isa-support)

2024-07-10 Thread Simon Chopin
Public bug reported:

This is showed by the isa-support autopkgtest regression. It is solved
on the glibc maintenance branch.

** Affects: glibc (Ubuntu)
 Importance: Medium
 Status: In Progress


** Tags: update-excuse

** Tags added: update-excuse

** Changed in: glibc (Ubuntu)
   Status: New => Triaged

** Changed in: glibc (Ubuntu)
   Status: Triaged => In Progress

** Changed in: glibc (Ubuntu)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072649

Title:
  glibc 2.39-3.1ubuntu2 breaks i386 feature detection (isa-support)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/2072649/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072657] [NEW] glibc Breaks: statement on libdkim needs to be adapted to Ubuntu

2024-07-10 Thread Simon Chopin
Public bug reported:

In the last glibc merge, I dropped this piece of delta (pasting only the
commit as the diff is a bit massive):

commit 2c85e22ed40f15047fd290e8203fdc3ecbd2b6a4
Author: Simon Chopin 
Date:   Fri Aug 11 14:40:30 2023 +0200

Adjust libc6-dev Breaks to account for binNMU vs no-change uploads

This delta is Ubuntu-specific and can be dropped after 24.04

It turns out my analysis back then was completely wrong. This should be
added back (but could be adjusted to remove the packages whose versions
have since been superseded)

** Affects: glibc (Ubuntu)
 Importance: Medium
 Assignee: Simon Chopin (schopin)
 Status: Triaged


** Tags: update-excuse

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072657

Title:
  glibc Breaks: statement on libdkim needs to be adapted to Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/2072657/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067482] Re: needrestart terminates itself on updates

2024-07-11 Thread Simon Chopin
Hi, verification done in a fresh Noble container:

root@needrestart-self:~# dpkg -l needrestart | tail -n 1
ii  needrestart3.6-7ubuntu4.1 all  check which daemons need to be 
restarted after library upgrades
root@needrestart-self:~# sudo systemd-run -u no-self-restart sh -c 'set -e; apt 
update; apt reinstall -y libc6; sleep 5; touch /tmp/did-not-self-restart'
Running as unit: no-self-restart.service; invocation ID: 
d833631b9b1443f4b68fd3c7ab4877a1
root@needrestart-self:~# ls -lh /tmp/did-not-self-restart
-rw-r--r-- 1 root root 0 Jul 11 09:24 /tmp/did-not-self-restart
root@needrestart-self:~# date
Thu Jul 11 09:24:20 UTC 2024
root@needrestart-self:~# systemctl status no-self-restart
Unit no-self-restart.service could not be found.


** Tags removed: verification-needed verification-needed-noble
** Tags added: verification-done verification-done-noble

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067482

Title:
  needrestart terminates itself on updates

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/needrestart/+bug/2067482/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2065863] Re: needrestart causes kernel upgrade messages in motd

2024-07-11 Thread Simon Chopin
Verified in a fresh VM:

root@needrestart-motd:~/needrestart-3.6# dpkg -l needrestart | tail -n 1
ii  needrestart3.6-7ubuntu4.1 all  check which daemons need to be 
restarted after library upgrades
root@needrestart-motd:~/needrestart-3.6# systemd-detect-virt
kvm
root@needrestart-motd:~/needrestart-3.6# ls /run/reboot-required
ls: cannot access '/run/reboot-required': No such file or directory
root@needrestart-motd:~/needrestart-3.6# gcc -shared -fPIC -ldl 
debian/tests/mockuname.c -o mockuname.so
root@needrestart-motd:~/needrestart-3.6# LD_PRELOAD=$PWD/mockuname.so apt 
install hello
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
The following NEW packages will be installed:
  hello
0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded.
Need to get 26.0 kB of archives.
After this operation, 106 kB of additional disk space will be used.
Get:1 http://archive.ubuntu.com/ubuntu noble/main amd64 hello amd64 
2.10-3build1 [26.0 kB]
Fetched 26.0 kB in 0s (309 kB/s)
Selecting previously unselected package hello.
(Reading database ... 105648 files and directories currently installed.)
Preparing to unpack .../hello_2.10-3build1_amd64.deb ...
Unpacking hello (2.10-3build1) ...
Setting up hello (2.10-3build1) ...
Processing triggers for man-db (2.12.0-4build2) ...
ERROR: ld.so: object '/root/needrestart-3.6/mockuname.so' from LD_PRELOAD 
cannot be preloaded (cannot open shared object file): ignored.
Processing triggers for install-info (7.1-3build2) ...
Scanning processes...
Scanning linux images...

Pending kernel upgrade!
Running kernel version:
  6.8.0-37-generic
Diagnostics:
  The currently running kernel version is not the expected kernel version 
6.8.0-38-generic.

Restarting the system to load the new kernel will not be handled
automatically, so you should consider rebooting.

No services need to be restarted.

No containers need to be restarted.

No user sessions are running outdated binaries.

No VM guests are running outdated hypervisor (qemu) binaries on this host.
root@needrestart-motd:~/needrestart-3.6# test ! -x /run/reboot-required || echo 
test failed
root@needrestart-motd:~/needrestart-3.6#


** Tags removed: verification-needed verification-needed-noble
** Tags added: verification-done verification-done-noble

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065863

Title:
  needrestart causes kernel upgrade messages in motd

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/needrestart/+bug/2065863/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2068573] Re: needrestart: better document Ubuntu-specific behaviours

2024-07-11 Thread Simon Chopin
Verified in a fresh container:

root@needrestart-nrconf:~# dpkg -l needrestart | tail -n 1
ii  needrestart3.6-7ubuntu4.1 all  check which daemons need to be 
restarted after library upgrades
root@needrestart-nrconf:~# man needrestart
root@needrestart-nrconf:~# man needrestart | grep -i ubuntu
  u   (u)buntu mode, used to customized the behaviour in the APT hook. 
See /usr/share/doc/README.Ubuntu.
root@needrestart-nrconf:~# needrestart --help | grep -i ubuntu
u   (u)buntu mode for the APT hook, see 
/usr/share/doc/needrestart/README.Ubuntu
root@needrestart-nrconf:~# cat /usr/share/doc/needrestart/README.Ubuntu
Starting from Ubuntu 24.04, needrestart in the default configuration will by
default not show the Debconf prompt, and restart automatically the affected
services. This includes when run as part of `unattended-upgrades` to ensure
that the security updates it brings are actually applied to running services
rather than leaving the system vulnerable.

For more details, see the following Discourse post:

https://discourse.ubuntu.com/t/needrestart-changes-in-ubuntu-24-04-service-restarts/44671
root@needrestart-nrconf:~#

** Tags removed: verification-needed verification-needed-noble
** Tags added: verification-done verification-done-noble

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068573

Title:
  needrestart: better document Ubuntu-specific behaviours

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/needrestart/+bug/2068573/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2068543] Re: Config variable $nrconf{restart} is no longer accurate: it always restarts

2024-07-11 Thread Simon Chopin
Verified on a fresh container (with the conf then removed to show the
difference):


root@needrestart-nrconf:~# dpkg -l needrestart | tail -n 1
ii  needrestart3.6-7ubuntu4.1 all  check which daemons need to be 
restarted after library upgrades
root@needrestart-nrconf:~# e^C
root@needrestart-nrconf:~# echo '$nrconf{restart} = "l";' > 
/etc/needrestart/conf.d/listmode.conf
root@needrestart-nrconf:~# apt reinstall libc6
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
0 upgraded, 0 newly installed, 1 reinstalled, 0 to remove and 0 not upgraded.
Need to get 3263 kB of archives.
After this operation, 0 B of additional disk space will be used.
Get:1 http://archive.ubuntu.com/ubuntu noble-updates/main amd64 libc6 amd64 
2.39-0ubuntu8.2 [3263 kB]
Fetched 3263 kB in 0s (20.3 MB/s)
Preconfiguring packages ...
(Reading database ... 34412 files and directories currently installed.)
Preparing to unpack .../libc6_2.39-0ubuntu8.2_amd64.deb ...
Unpacking libc6:amd64 (2.39-0ubuntu8.2) over (2.39-0ubuntu8.2) ...
Setting up libc6:amd64 (2.39-0ubuntu8.2) ...
Processing triggers for libc-bin (2.39-0ubuntu8.2) ...
Disabling Ubuntu mode, explicit restart mode configuredScanning processes... [  

  Scanning processes...
Scanning candidates...

Services to be restarted:
 systemctl restart console-getty.service
 systemctl restart cron.service
 systemctl restart packagekit.service
 systemctl restart polkit.service
 systemctl restart rsyslog.service
 systemctl restart systemd-journald.service
 systemctl restart systemd-networkd.service
 systemctl restart systemd-resolved.service
 systemctl restart systemd-udevd.service
 systemctl restart udisks2.service

Service restarts being deferred:
 /etc/needrestart/restart.d/dbus.service
 systemctl restart systemd-logind.service
 systemctl restart unattended-upgrades.service

No containers need to be restarted.

No user sessions are running outdated binaries.

No VM guests are running outdated hypervisor (qemu) binaries on this host.
root@needrestart-nrconf:~# rm /etc/needrestart/conf.d/listmode.conf
root@needrestart-nrconf:~# apt reinstall libc6
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
0 upgraded, 0 newly installed, 1 reinstalled, 0 to remove and 0 not upgraded.
Need to get 3263 kB of archives.
After this operation, 0 B of additional disk space will be used.
Get:1 http://archive.ubuntu.com/ubuntu noble-updates/main amd64 libc6 amd64 
2.39-0ubuntu8.2 [3263 kB]
Fetched 3263 kB in 0s (17.3 MB/s)
Preconfiguring packages ...
(Reading database ... 34412 files and directories currently installed.)
Preparing to unpack .../libc6_2.39-0ubuntu8.2_amd64.deb ...
Unpacking libc6:amd64 (2.39-0ubuntu8.2) over (2.39-0ubuntu8.2) ...
Setting up libc6:amd64 (2.39-0ubuntu8.2) ...
Processing triggers for libc-bin (2.39-0ubuntu8.2) ...
Scanning processes...
Scanning candidates...

Restarting services...
 systemctl restart console-getty.service cron.service packagekit.service 
polkit.service rsyslog.service systemd-journald.service 
systemd-networkd.service systemd-resolved.service systemd-udevd.service 
udisks2.service

Service restarts being deferred:
 /etc/needrestart/restart.d/dbus.service
 systemctl restart systemd-logind.service
 systemctl restart unattended-upgrades.service

No containers need to be restarted.

No user sessions are running outdated binaries.

No VM guests are running outdated hypervisor (qemu) binaries on this host.
root@needrestart-nrconf:~#

** Tags removed: verification-needed verification-needed-noble
** Tags added: verification-done verification-done-noble

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068543

Title:
  Config variable $nrconf{restart} is no longer accurate: it always
  restarts

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/needrestart/+bug/2068543/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072766] [NEW] glibc: drop the nanosleep fallback delta

2024-07-11 Thread Simon Chopin
Public bug reported:

We have shipped a patch for glibc since groovy that adds a fallback path
for clock_nanosleep_time64 to use CLOCK_MONOTONIC, to work around a bug
in WSL1 (see bug 1871240). This has since been fixed in the WSL1
implementation (WSL2 is out of scope as they use a full-blown Linux
kernel).

A glibc version without that patch has been tested by @cnihelton on
modern WSL1 without encountering the original issues, let's drop it
moving forward.

** Affects: glibc (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072766

Title:
  glibc: drop the nanosleep fallback delta

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/2072766/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2044104] Re: [UBUNTU 20.04] chzdev -e is rebuilding initramfs even with zdev:early=0 set

2024-07-11 Thread Simon Chopin
** Changed in: systemd (Ubuntu)
 Assignee: (unassigned) => Simon Chopin (schopin)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2044104

Title:
  [UBUNTU 20.04] chzdev -e is rebuilding initramfs even with
  zdev:early=0 set

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2044104/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069875] Re: [needs-packaging] cmocka-mocks

2024-07-12 Thread Simon Chopin
Hi Alexandre!

I did a first review of the package.

My first question is a bit global: what's the use case for this? Is it
supposed to be used at build time? I think for now it would be easier to
have just a -dev package that provides the headers and static libraries,
and not bother with shared libraries, as those tend to just make things
harder. Notably, there's an expectation of ABI stability with a libfoo0
package, which I'm guessing isn't very high on upstream's list of
priorities.

After that, the rest of my remarks are pretty trivial in comparison ;)

d/changelog:
We usually don't mention all the steps in the initial package.

Maybe use dh_installdocs for the docs?

Bonus exercise: don't build the docs when using the nodocs profile (and
don't pull in the dependencies for it)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069875

Title:
  [needs-packaging] cmocka-mocks

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/2069875/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2063442] Re: needrestart on Ubuntu 24.04 is restarting google-guest-agent startup and shutdown scrips on reinstall but they should not be restarted

2024-07-15 Thread Simon Chopin
** Tags removed: verification-needed verification-needed-noble
** Tags added: verification-done verification-done-noble

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063442

Title:
  needrestart on Ubuntu 24.04 is restarting google-guest-agent  startup
  and shutdown scrips on reinstall but they should not be restarted

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/needrestart/+bug/2063442/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071609] Re: [SRU exception] backport 5.37 to Jammy and Noble

2024-07-15 Thread Simon Chopin
** Description changed:

  Please be advised that some part of the changes only apply to the Jammy SRU.
  Current versions:
  Jammy: 5.32ubuntu3~22.04.1
  Noble: 5.34ubuntu2
+ 
+ This SRU follows the exception process as outlined at
+ https://wiki.ubuntu.com/StableReleaseUpdates#autopkgtest rather than the
+ standard SRU rules.
  
  [Impact]
  
  This release contains both bug fixes and new features and we would like
  to make sure all of our developers have access to these improvements.
  Some notable ones are:
  
  5.36:
    * Changes in source package selection:
  - Truly honor pinning when looking for the source package to download
  - find_source_version_to_download: always check the src package name
    (LP: #2066290)
    * setup-testbed: prevent /tmp from getting a tmpfs mount (LP: #2069834)
    * t/a-buildvm-ubuntu-cloud: use minimal image where possible
    * setup-testbed: Add support for netplan.io networking
  (Closes: #960729) (LP: #2060187)
  5.35:
    * Resolve and install test dependencies using apt-get satisfy
    * autopkgtest-build-lxd: Extract lxc client version correctly. (LP: 
#2069274, LP: #2069283)
  
  The following only applies for the Jammy SRU:
  5.34:
    * add support for deb822 sources (LP: #2052639)
  5.33:
    * qemu: use device-tree for booting riscv64 (LP: #2056764)
    * qemu: boot riscv64 via EFI (LP: #2056764)
  
  See the changelog entry below for a full list of changes and bugs.
  
  [Test Plan]
  
  autopkgtest contains a test suite that is run using the SRU package for
  each release. This test suite's results are available here:
  
  Noble:
   * amd64: PASS 
https://autopkgtest.ubuntu.com/results/autopkgtest-noble-hyask-autopkgtest5.37-noble/noble/amd64/a/autopkgtest/20240701_200428_1869c@/log.gz
   * arm64: PASS 
https://autopkgtest.ubuntu.com/results/autopkgtest-noble-hyask-autopkgtest5.37-noble/noble/arm64/a/autopkgtest/20240702_124958_c97ec@/log.gz
   * armhf: SKIP 
https://autopkgtest.ubuntu.com/results/autopkgtest-noble-hyask-autopkgtest5.37-noble/noble/armhf/a/autopkgtest/20240702_094504_0e512@/log.gz
   * i386: FAIL (expected, main tests are green) 
https://autopkgtest.ubuntu.com/results/autopkgtest-noble-hyask-autopkgtest5.37-noble/noble/i386/a/autopkgtest/20240703_000615_861eb@/log.gz
   * ppc64el: FAIL (expected, main tests are green) 
https://autopkgtest.ubuntu.com/results/autopkgtest-noble-hyask-autopkgtest5.37-noble/noble/ppc64el/a/autopkgtest/20240702_130714_dc1b8@/log.gz
   * s390x: FAIL (expected, main tests are green) 
https://autopkgtest.ubuntu.com/results/autopkgtest-noble-hyask-autopkgtest5.37-noble/noble/s390x/a/autopkgtest/20240702_112706_c6126@/log.gz
  
  Jammy:
   * amd64: PASS 
https://autopkgtest.ubuntu.com/results/autopkgtest-jammy-hyask-autopkgtest5.37-jammy/jammy/amd64/a/autopkgtest/20240702_094650_78193@/log.gz
   * arm64: PASS 
https://autopkgtest.ubuntu.com/results/autopkgtest-jammy-hyask-autopkgtest5.37-jammy/jammy/arm64/a/autopkgtest/20240702_150636_4fc1c@/log.gz
   * armhf: SKIP 
https://autopkgtest.ubuntu.com/results/autopkgtest-jammy-hyask-autopkgtest5.37-jammy/jammy/armhf/a/autopkgtest/20240702_094639_aefba@/log.gz
   * i386: FAIL (expected) 
https://autopkgtest.ubuntu.com/results/autopkgtest-jammy-hyask-autopkgtest5.37-jammy/jammy/i386/a/autopkgtest/20240702_104537_6950b@/log.gz
   * ppc64el: FAIL (expected, main tests are green) 
https://autopkgtest.ubuntu.com/results/autopkgtest-jammy-hyask-autopkgtest5.37-jammy/jammy/ppc64el/a/autopkgtest/20240702_112026_f1778@/log.gz
   * s390x: FAIL (expected, main tests are green) 
https://autopkgtest.ubuntu.com/results/autopkgtest-jammy-hyask-autopkgtest5.37-jammy/jammy/s390x/a/autopkgtest/20240702_104356_32b4a@/log.gz
  
  We don't expect them to pass fully, but at least on amd64 and arm64 they
  are green.
  
  Additionally, the following PPAs should be tested manually at least under 
normal development conditions to ensure users will only be impacted by 
corner-case issues, should they arise:
  * https://launchpad.net/~hyask/+archive/ubuntu/autopkgtest5.37-noble
  * https://launchpad.net/~hyask/+archive/ubuntu/autopkgtest5.37-jammy
  
  Note that the `jammy` PPA is already under daily test by our auto-
  upgrade testing infrastructure.
  
  Please take a particular attention to test the cross-arch feature, as there 
is no automated tests for this.
  Here is the documentation on this feature: 
https://wiki.ubuntu.com/ProposedMigration#How_to_run_cross-architecture_autopkgtest_locally_using_QEMU
  Be knowledgeable that the `mawk` is particularly well suited for these kind 
of tests.
  
  [Where problems could occur]
  
  As always with those big updates, there might be corner-case issues not 
covered by the automated test suite.
  Also, with the differences in Python version, some library interfaces could 
have changed in untested code, leading to crashes.
  Given that this tool is mainly used by developers, users are likely to find 
workarounds or report bugs when t

[Bug 2068933] Re: all reports with LaunchpadPrivate in them are tagged need-$arch-retrace

2024-07-16 Thread Simon Chopin
It's on my board for this pulse.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068933

Title:
  all reports with LaunchpadPrivate in them are tagged need-$arch-
  retrace

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/2068933/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2068933] Re: all reports with LaunchpadPrivate in them are tagged need-$arch-retrace

2024-07-16 Thread Simon Chopin
I've looked a bit into it. It seems this has been going on for more than
a decade, it might just be that so far most explicitly private reports
we were getting were for crashes.

Just so that I'm clear, adding `apport` as a subscriber is needed for
the retrace/duplicate bit, but not for the generic private case, right?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068933

Title:
  all reports with LaunchpadPrivate in them are tagged need-$arch-
  retrace

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/2068933/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2068933] Re: all reports with LaunchpadPrivate in them are tagged need-$arch-retrace

2024-07-17 Thread Simon Chopin
Ongoing work at https://github.com/canonical/apport/pull/367

** Changed in: apport (Ubuntu)
   Status: Triaged => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068933

Title:
  all reports with LaunchpadPrivate in them are tagged need-$arch-
  retrace

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/2068933/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2004203] Re: With needrestart, apt-get does not respect non-interactive instruction when upgrading services

2024-09-05 Thread Simon Chopin
Can someone please modify the bug to adhere to the SRU template?

https://canonical-sru-docs.readthedocs-
hosted.com/en/latest/reference/bug-template/

It's a requisite condition for the fix to be uploaded and eventually
released.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2004203

Title:
  With needrestart, apt-get does not respect non-interactive instruction
  when upgrading services

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/needrestart/+bug/2004203/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2044104] Re: [UBUNTU 20.04] chzdev -e is rebuilding initramfs even with zdev:early=0 set

2024-09-05 Thread Simon Chopin
** Changed in: systemd (Ubuntu Oracular)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2044104

Title:
  [UBUNTU 20.04] chzdev -e is rebuilding initramfs even with
  zdev:early=0 set

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2044104/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2080346] Re: autopkg test timeouts on arm64

2024-09-11 Thread Simon Chopin
Note that while it's a bit curious that the infra suddenly started
routing those IPs, here I think rust-reqwest is wrong in the end. If you
want an IP that's not routed, you should use one from an IP range from
RFC 5735, as those should be treated by reasonable admins as follow:

> Network operators SHOULD add these address blocks to the list of non-
> routeable address spaces, and if packet filters are deployed, then
> this address block SHOULD be added to packet filters.

https://www.rfc-editor.org/rfc/rfc5737.html

Duct-taping the infra to work around this is fine as a short-term
solution but we really ought to work with upstream to fix this more
durably.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2080346

Title:
  autopkg test timeouts on arm64

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/rust-reqwest/+bug/2080346/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2063200] Re: useradd --extrausers --groups tries to lock /etc/group

2024-05-27 Thread Simon Chopin
** Description changed:

  [ Impact ]
  
  On Ubuntu Core 24 calling the command line
  
  useradd --extrausers --groups somegroup somenewuser
  
  ... fails with:
  
  useradd: cannot lock /etc/group; try again later.
  
  It worked on 22.04. /etc is not writable. It also fails if somegroup is
  a group in extrausers.
  
  [ Test Plan ]
  
  Part of the upload is adding an autopkgtest script testing useradd and
  usermod in the extrausers+readonly-etc case.
  
  In addition, the following commands should be run as root in a fresh
  container:
  
  ```
  # Install prerequisites
  apt install libnss-extrausers
  sed -i -r -e'/^(passwd|group|shadow|gshadow)/ s/$/ extrausers/' 
/etc/nsswitch.conf # enable extrausers in group, passwd, shadow and gshadow
  
  # Sanity checks of "normal" path
  groupadd etcgroup
  useradd --groups etcgroup etcuser
  id etcuser | grep etcgroup
  groupadd etcgroup2
  usermod --groups etcgroup2 etcuser
  id etcuser | grep etcgroup2
  useradd --groups nullgroup etcuser || echo Successfully rejected invalid group
  
  ls /var/lib/extrausers/ # should be empty
  
  # Sanity checks of "extrausers" path in rw context
  groupadd --extrausers extragroup
  useradd --extrausers --groups extragroup extrauser # currently fails
  id extrauser | grep extragroup
  useradd --extrausers extrauser2
  id extrauser2
- usermod --extrausers --groups extragroup extrauser2
+ usermod --groups extragroup extrauser2
  id extrauser2 | grep extragroup
  
  # Sanity checks of "extrausers" path in ro context
  mv /etc /etc-rw
  mkdir /etc
  mount -o bind,ro /etc-rw /etc
  groupadd --extrausers extragroup2
  useradd --extrausers --groups etcgroup extrauser3
  id extrauser4 | grep etcgroup
- usermod --extrausers --groups extragroup2 extrauser3
+ usermod --groups extragroup2 extrauser3
  id extrauser4 | grep extragroup2
  ```
  
  Furthermore, validation from the Ubuntu Core team that this actually fixes
  their use case is required.
  
  [ Where problems could occur ]
  
  Regression potential is in the group validation stage of the `usermod` and
  `useradd` tools. Besides the usual risks related to C code, the various 
failure
  scenarios that come to mind are:
  
  * try to add the user to an non-existing local group, which would fail further
    down with a different error message
  * actually fail to identify a valid local group
  * Fail to either add the user to the system, or the user to the group
  * Update the wrong file (/var/lib/extrausers/* vs /etc/*)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063200

Title:
  useradd --extrausers --groups tries to lock /etc/group

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/2063200/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2063200] Re: useradd --extrausers --groups tries to lock /etc/group

2024-05-27 Thread Simon Chopin
Thanks for testing and catching that regression! I've found and fixed
the issue in an oracular upload. Once it clears -proposed I'll amend the
noble-proposed version.

** Changed in: shadow (Ubuntu Noble)
   Status: Fix Committed => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063200

Title:
  useradd --extrausers --groups tries to lock /etc/group

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/2063200/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2065863] Re: needrestart causes kernel upgrade messages in motd

2024-05-28 Thread Simon Chopin
This is a new feature that I implemented based on what I had understood
were your requirements: integrating needrestart with /run/reboot-
required. Apparently, MOTD picks up whatever we write in that file.

Shall I walk that part back and not write to that file in the case of
kernel updates? I suppose needrestart could also go through update-
notifier and mimick the kernel postinst code somehow?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065863

Title:
  needrestart causes kernel upgrade messages in motd

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/needrestart/+bug/2065863/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2065863] Re: needrestart causes kernel upgrade messages in motd

2024-05-28 Thread Simon Chopin
** Tags added: foundations-todo

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065863

Title:
  needrestart causes kernel upgrade messages in motd

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/needrestart/+bug/2065863/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2061637] Re: [SRU] xx-svn-review crashed with ModuleNotFoundError

2024-05-28 Thread Simon Chopin
Hi Sudip,

I've uploaded the Mantic and Jammy packages to the SRU queue. Thanks for
your work :)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061637

Title:
  [SRU] xx-svn-review crashed with ModuleNotFoundError

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xxdiff/+bug/2061637/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067482] [NEW] needrestart terminates itself on updates

2024-05-29 Thread Simon Chopin
Public bug reported:

This is an expansion on bug 2059337. There's likely a fair number of
custom services out there that are similar in nature to cloud-init,
unattended-upgrade and the likes. Rather than forcing every user to
track down and debug this issue, needrestart should instead have some
sort of "self-preservation instinct" and exclude itself from the default
restart list.

While this issue isn't particularly new, it has become much more urgent
in Noble onwards as we've modified it to default to silently restarting
services.

** Affects: needrestart (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067482

Title:
  needrestart terminates itself on updates

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/needrestart/+bug/2067482/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Re: [Bug 244250] Re: Spurious reboot notifications caused by libssl upgrades.

2024-05-29 Thread Simon Chopin
Well, we're not in the world of needrestart just yet, it's only seeded in
Server.

On Thu, 30 May 2024, 04:20 Seth Arnold, <244...@bugs.launchpad.net>
wrote:

> Adrien, thanks so much for digging into this again.
>
> This is so very complicated, why does openssl need special handling in
> the world of needrestart? My inclination is to remove all this
> complexity and address any shortcomings of needrestart in the
> needrestart package. Am I off base?
>
> Thanks
>
> --
> You received this bug notification because you are subscribed to openssl
> in Ubuntu.
> https://bugs.launchpad.net/bugs/244250
>
> Title:
>   Spurious reboot notifications caused by libssl upgrades.
>
> Status in openssl package in Ubuntu:
>   Fix Released
>
> Bug description:
>   The postinst script for libssl0.9.8 currently has a bug where it sends
>   a reboot notifcation whenever libssl is configured.  So reconfiguring
>   libssl0.9.8 or even just installing libssl0.9.8 will result in a
>   reboot notification.  Sending of the reboot notification should
>   definitely be moved inside the upgrading guard.  The correct fix is
>   likely to move it inside a version comparison guard for particular
>   important updates like Colin suggests below -- this is what every
>   other standard package using notify-reboot-required does.
>
> To manage notifications about this bug go to:
>
> https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/244250/+subscriptions
>
> Launchpad-Notification-Type: bug
> Launchpad-Bug: distribution=ubuntu; sourcepackage=openssl; component=main;
> status=Fix Released; importance=Undecided; assignee=
> marc.deslauri...@canonical.com;
> Launchpad-Bug-Tags: glucid lucid
> Launchpad-Bug-Information-Type: Public
> Launchpad-Bug-Private: no
> Launchpad-Bug-Security-Vulnerability: no
> Launchpad-Bug-Commenters: adrien andersk cjwatson
> iamnotwhatiam-deactivatedaccount janitor khaled-blah mdeslaur
> nutznboltz-deactivatedaccount seth-arnold tabbott tbushnell tepples
> Launchpad-Bug-Reporter: i am not what i am
> (iamnotwhatiam-deactivatedaccount)
> Launchpad-Bug-Modifier: Seth Arnold (seth-arnold)
> Launchpad-Message-Rationale: Subscriber (openssl in Ubuntu)
> Launchpad-Message-For: schopin
>
>

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/244250

Title:
  Spurious reboot notifications caused by libssl upgrades.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/244250/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2066995] Re: apport-gtk keeps prompting to report crashes in a loop

2024-05-30 Thread Simon Chopin
Steve, do you still have the crash file on your system? If so, could you
give us its mod and owner?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2066995

Title:
  apport-gtk keeps prompting to report crashes in a loop

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/2066995/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2066995] Re: apport-gtk keeps prompting to report crashes in a loop

2024-05-30 Thread Simon Chopin
Interestingly, I see the same "could not be opened" patter in my recent
logs, all for crashes within Python executables.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2066995

Title:
  apport-gtk keeps prompting to report crashes in a loop

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/2066995/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

  1   2   3   4   5   6   7   8   9   10   >