There isn't a plan completely laid out for backporting this. It can be
done but as you can see here, it's a very minimal change and it barely
passes the criteria for backporting. This means it absolutely must be
staged so that it's picked up by a subsequent security update rather
than being a stand
Public bug reported:
libnss-ldap and libpam-ldap FTBFS and have been removed from Debian;
ldap-auth-client is a metapackage that depends on both.
I've asked the server team and Andreas in particular about the removals
and he agreed with them.
# libnss-ldap
> ldap-nss.c:1945:15: error: implicit
AFAIU you were asking for a backport in 16.04 from 18.04. Unfortunately
this hasn't happened and I guess you don't use 16.04 anymore. As such,
I'll close the bug.
** Changed in: gnutls28 (Ubuntu)
Status: Confirmed => Won't Fix
--
You received this bug notification because you are a member
I've marked another report as a duplicate of this one even though it's
about the newly-uploaded 1.8.1
Simon Quigley mentions the following from excuses:
-
https://launchpad.net/ubuntu/+source/libunwind/1.8.1-0.1/+build/30119512
And from the test rebuilt:
-
https://launchpadlibrarian.net/783617
*** This bug is a duplicate of bug 2095325 ***
https://bugs.launchpad.net/bugs/2095325
** This bug has been marked a duplicate of bug 2095325
libunwind: FTBFS on arm64 and i386 plus test failures
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subsc
I've tried to reproduce the issue today on oracular and couldn't. It
looks like the path taken is the same (there's some thing with
expiration date I don't explain but it's in the future anyway). I guess
the issue has been fixed in gnutls. Moreover this issue is old, has seen
no recent activity and
I think all these are fixed. The flag isn't used anymore IIRC and there
are no such autopkgtest failures currently. I'll close the bugs.
** Changed in: libarchive (Ubuntu)
Status: New => Fix Released
** Changed in: libxml2 (Ubuntu)
Status: New => Fix Released
** Changed in: gnutls2
Since the issue is fixed in newer versions and this only applies to
releases that are either only in legacy support or about to be, I'll
close the issue.
** Changed in: gnutls28 (Ubuntu)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs
*** This bug is a duplicate of bug 2104174 ***
https://bugs.launchpad.net/bugs/2104174
** This bug has been marked a duplicate of bug 2104174
libnss-ldap, libpam-ldap, ldap-auth-client: please RM
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subsc
I think we're not going to try to backport that due to how long ago this
way so I'll close the bug.
** Changed in: gnutls28 (Ubuntu)
Status: Confirmed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.la
** Changed in: gnutls28 (Ubuntu)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1917954
Title:
vagrant reports undefined symbol __gmpz_limbs_write
To manage notificat
** Changed in: gnutls28 (Ubuntu)
Status: Confirmed => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1635303
Title:
GnuTLS bug in https method from apt-1.0.1ubuntu2.15 package
To m
*** This bug is a duplicate of bug 1876286 ***
https://bugs.launchpad.net/bugs/1876286
Definitely looks a lot like that bug. I'm marking it as duplicate,
thanks.
** This bug has been marked a duplicate of bug 1876286
Evolution reports "Error performing TLS handshake: Internal error in memo
I think it's too late for action now and basically impossible to
reproduce/investigate so I'll close the bug.
** Changed in: gnutls28 (Ubuntu)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bug
AFAIU this was an issue in an old gnutls update on xenial and it only
occured with a specific version and probably on the subsequent apt
upgrade. All reports are very tightly grouped in time and there has been
none for more than seven years so I guess that subsequent versions fixed
it.
** Changed
AFAIU:
- this is probably not an issue anymore,
- and in any case, the issue with gnutls28 is long gone.
I'm going to close this issue for gnutls28 as fix released due to that.
** Changed in: gnutls28 (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification becaus
*** This bug is a duplicate of bug 1701412 ***
https://bugs.launchpad.net/bugs/1701412
** This bug has been marked a duplicate of bug 1701412
package libgnutls30:i386 3.4.10-4ubuntu1.3 failed to install/upgrade:
package is in a very bad inconsistent state; you should reinstall it before
*** This bug is a duplicate of bug 1701412 ***
https://bugs.launchpad.net/bugs/1701412
** This bug has been marked a duplicate of bug 1701412
package libgnutls30:i386 3.4.10-4ubuntu1.3 failed to install/upgrade:
package is in a very bad inconsistent state; you should reinstall it before
*** This bug is a duplicate of bug 1701412 ***
https://bugs.launchpad.net/bugs/1701412
** This bug has been marked a duplicate of bug 1701412
package libgnutls30:i386 3.4.10-4ubuntu1.3 failed to install/upgrade:
package is in a very bad inconsistent state; you should reinstall it before
*** This bug is a duplicate of bug 1701412 ***
https://bugs.launchpad.net/bugs/1701412
** This bug has been marked a duplicate of bug 1701412
package libgnutls30:i386 3.4.10-4ubuntu1.3 failed to install/upgrade:
package is in a very bad inconsistent state; you should reinstall it before
** Changed in: gnutls28 (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2076340
Title:
SRU: no-change rebuild to pick up changed build flags on ppc64el and
Unfortunately, TLS libraries are large beasts and even patch updates
often introduce small behaviour changes which rules them out for
backports. Major releases are basically guaranteed to contain such
behaviour changes and are therefore impossible to backport sadly.
** Changed in: gnutls28 (Ubuntu
There is currently no FTBFS for gnutls28 and hirsute is out of support
now so I'm going to close the bug.
** Changed in: gnutls28 (Ubuntu)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.la
I don't think there would be plans to do such a backport now so closing.
** Changed in: gnutls26 (Ubuntu)
Status: Confirmed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1373422
T
crypto-policies is RH-specific. While the tool can be ported/installed,
all the connections from other software to it does not exist in other
systems. Closing the issue for gnutls28.
NB: I've been working on https://github.com/canonical/crypto-config/
which answers similar needs but the issue here
I'm going to close this for gnutls26 since it's an old release by now,
and for gnutls28 since I can't reproduce (fedorahosted is no more and I
couldn't reproduce on kernel.org, and I definitely don't have F5
firewalls handy).
** Changed in: gnutls26 (Ubuntu)
Status: Confirmed => Won't Fix
I can't reproduce that anymore, closing.
** Changed in: strace (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/627208
Title:
return code 0 when failing to
AfAIK this isn't an issue anymore.
** Changed in: strace (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/484083
Title:
strace doesn't decode stat() arguments on
I don't similar issues nowadays. Considering the issue is very old and
involves openoffice (my fingers even typed "libr" by habit now), I'm
going to close this as Incomplete.
** Changed in: strace (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a m
*** This bug is a duplicate of bug 1062412 ***
https://bugs.launchpad.net/bugs/1062412
** This bug is no longer a duplicate of private bug 755619
** This bug has been marked a duplicate of bug 1062412
strace crashed with SIGSEGV in __GI_raise()
--
You received this bug notification becaus
I think this doesn't apply anymore: the code in the patch isn't there
anymore and printing is done through dedicated functions.
** Changed in: strace (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
I think that if this has not been fixed, this is not relevant anymore as
people would instead strace from the 64-bit side. Moreover, these cross-
world operations can be very difficult and are unlikely to change
further in the future even if this still happens.
** Changed in: strace (Ubuntu)
Hi, can you give more details about what happened to termius-beta and
why you were stracing it? In particular, was termius-beta itself
crashing?
** Changed in: strace (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
I cannot reproduce the issue so I assume the fix has been merged and
released.
** Changed in: strace (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1766060
I think this would be very difficult to try to reproduce 16 years later
and probably not worth it considering that we were seeing this issue
from several people but we don't anymore. As such, I assume that the
issue existed but has been fixed.
** Changed in: strace (Ubuntu)
Status: Triaged
*** This bug is a duplicate of bug 1062412 ***
https://bugs.launchpad.net/bugs/1062412
Marking as duplicate of #1062412 ; it appears that strace mimics the
exit of the straced program.
** This bug has been marked a duplicate of bug 1062412
strace crashed with SIGSEGV in __GI_raise()
--
Y
I think that if this has not been fixed, this is not relevant anymore as
people would instead strace from the 64-bit side. Moreover, these cross-
world operations can be very difficult and are unlikely to change
further in the future even if this still happens.
** Changed in: strace (Ubuntu)
AFAIU this has been fixed and is now in the released versions of Ubuntu
so closing as fix released.
** Changed in: strace (Ubuntu)
Status: New => Triaged
** Changed in: strace (Ubuntu)
Status: Triaged => Fix Released
--
You received this bug notification because you are a member o
There has indeed been a behaviour change a while ago. AFAIK this has
been relaxed to allow ptracing processes of the same user so this
shouldn't be an issue anymore.
** Changed in: strace (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubu
Made a mistake: it's not actually a duplicate of that.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/324553
Title:
strace crashed with SIGSEGV in free()
To manage notifications about this bug go to
Marking as Invalid as that seems expected: strace uses ptrace which does
not work across setuid/setgid binaries which crontab is.
-rwxr-sr-x 1 root crontab 43K Jun 6 2024 /usr/bin/crontab
This is intended for security (otherwise it would be trivial to hijack
`su`).
** Changed in: strace (Ubunt
** Changed in: strace (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1426635
Title:
strace stack buffer overflow
To manage notifications about this
*** This bug is a duplicate of bug 1062412 ***
https://bugs.launchpad.net/bugs/1062412
** This bug is no longer a duplicate of private bug 755619
** This bug has been marked a duplicate of bug 1062412
strace crashed with SIGSEGV in __GI_raise()
--
You received this bug notification becaus
Couldn't find the traces (anymore?). The bug doesn't happen anymore
according to the tracker. Closing as Incomplete.
** Changed in: strace (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https
*** This bug is a duplicate of bug 1062412 ***
https://bugs.launchpad.net/bugs/1062412
** This bug has been marked a duplicate of bug 1062412
strace crashed with SIGSEGV in __GI_raise()
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to t
** Changed in: strace (Ubuntu)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1062412
Title:
strace crashed with SIGSEGV in __GI_raise()
To manage notifications a
*** This bug is a duplicate of bug 1062412 ***
https://bugs.launchpad.net/bugs/1062412
Thanks a lot yzp15, this is very helpful. I'm going to mark these bugs
as duplicate and close them as Invalid since it's made on purpose.
** This bug has been marked a duplicate of bug 1062412
strace cra
I'm going to close this bug. I agree there is an expected limitation
there as Ortwin pointed out. Strace is powerful but also very invasive
(well, the first thing that is invasive is ptrace).
** Changed in: strace (Ubuntu)
Status: Confirmed => Invalid
--
You received this bug notification
*** This bug is a duplicate of bug 1062412 ***
https://bugs.launchpad.net/bugs/1062412
** This bug is no longer a duplicate of bug 324553
strace crashed with SIGSEGV in free()
** This bug has been marked a duplicate of bug 1062412
strace crashed with SIGSEGV in __GI_raise()
--
You rece
Marking as duplicate of #1062412 ; it appears that strace mimics the
exit of the straced program.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/324553
Title:
strace crashed with SIGSEGV in free()
T
AFAIU, this has been fixed, but maybe not backported to released
versions. Since this was 15 years ago and all these versions are now out
of support anyway, I'm closing this as Fix Released.
** Changed in: strace (Ubuntu)
Status: New => Fix Released
--
You received this bug notification b
I'm closing this as the issue is not present anymore and this was for an
ancient version.
** Changed in: strace (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bug
I've been following that topic from a distance since it's linked to
openssl.
I've just seen https://github.com/curl/curl/wiki/curl-distro-
discussion-2025 which mentions "HTTP/3 - updates on status and
discussions on how to (possibly) enable this in curl for distros going
forward". The curl Debian
I remembered seeing aircrack-ng in merges.ubuntu.com and it looks like
the latest upload in Debian is actually related to that issue so a merge
should help: https://tracker.debian.org/news/1561207/accepted-aircrack-
ng-117git202308074bf83f1a-2-source-into-unstable/
Changes:
aircrack-ng (1:1.7+git
Hi Gauthier, I'm pasting below relevant entries in the changelog. As
you'll see, using pkg-config has been suggested after Jammy and the
script has been removed after Noble. What is requiring libgcrypt-config
and can we work on updating that instead maybe?
libgcrypt20 (1.11.0~beta450-1) experiment
Thanks for the kind words and thanks a lot for your great review.
All your comments look appropriate. I've mentioned a few things on
mattermost but for completeness:
* d/changelog, thanks for doing that
* d/crypto-config-docs.*, I probably inherited that from dh-make and I don't
remember really
** Description changed:
This is a new package for which Canonical is the upstream. The purpose
is to create profiles of cryptography configuration that will be used
across software in the distribution.
I'd like to have it uploaded to universe.
There is a pretty complete specificati
** Description changed:
This is a new package for which Canonical is the upstream. The purpose
is to create profiles of cryptography configuration that will be used
across software in the distribution.
I'd like to have it uploaded to universe.
URL: https://github.com/canonical/cryp
** Changed in: ubuntu
Importance: High => Wishlist
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2098879
Title:
[needs-packaging] crypto-config in universe
To manage notifications about this bug
** Description changed:
This is a new package for which Canonical is the upstream. The purpose
is to create profiles of cryptography configuration that will be used
across software in the distribution.
I'd like to have it uploaded to universe.
There is a pretty complete specificati
I've seen the following in the linked discussions:
> Hey Everyone 👋 Thanks for your patience with the checkout errors and
random failures. We discovered it was an issue with the underlying
hardware and have migrated all the runners to a different arm sku
(dpdsv5) and this should solve the errors y
** Also affects: p11-kit (Ubuntu)
Importance: Undecided
Status: New
** Changed in: p11-kit (Ubuntu)
Status: New => Fix Released
** Changed in: p11-kit (Ubuntu)
Importance: Undecided => High
** Changed in: p11-kit (Ubuntu)
Assignee: (unassigned) => Adrien Nade
on in main.
I think the packaging looks good overall but forgive me if I've missed
something as there are so many different things to pay attention to with
new packages.
** Affects: ubuntu
Importance: High
Assignee: Adrien Nader (adrien)
Status: In Progress
--
You received
** Changed in: gnutls28 (Ubuntu)
Status: Triaged => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2098424
Title:
gnutls28 fails to build from source in plucky
To manage notificat
** Changed in: gnutls28 (Ubuntu)
Importance: Undecided => High
** Changed in: gnutls28 (Ubuntu)
Status: New => Triaged
** Changed in: gnutls28 (Ubuntu)
Assignee: (unassigned) => Adrien Nader (adrien)
--
You received this bug notification because you are a member of Ub
** Tags added: foundations-todo
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2098424
Title:
gnutls28 fails to build from source in plucky
To manage notifications about this bug go to:
https://bugs
Thanks for the update. I've looked more at the logs and I'm very
surprised to see the following:
libgit2: 1.8.1 (sys:0.19.0 vendored)
libcurl: 8.9.0-DEV (sys:0.4.74+curl-8.9.0 vendored ssl:OpenSSL/1.1.1w)
ssl: OpenSSL 1.1.1w 11 Sep 2023
I guess that's from some binary install of rust
My point is that you linked to six different bug reports on github
which, when taken together, point to an issue being elsewhere. If there
are unrelated reports in that list, can you remove them? It's difficult
for me to read through so much stuff if it's only loosely correlated.
Also, if the issu
Hi and thanks for your report.
I can't find a direct link between all these reports, or at least not
one that points towards openssl. In particular, GCC does not use openssl
which means that crashes in GCC cannot be explained by problems in
openssl.
Since it looks like there may be a single issue
** Changed in: openssl (Ubuntu)
Status: Triaged => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2096810
Title:
[25.04 FEAT] openSSL MSA 10 XTS support
To manage notifications ab
Public bug reported:
Please sync m2crypto 0.42.0-2.1 (universe) from Debian unstable (main)
Explanation of the Ubuntu delta and why it can be dropped:
* d/p/openssl-3.4-ftbfs.patch:
Remove as this was leading to a whack-a-mole game trying to have
SWIG parse properly all system headers
I
Public bug reported:
There is a new version in Debian (1.8.11-2) and merging it fixes tests
failures for the new libnftnl.
** Affects: iptables (Ubuntu)
Importance: High
Assignee: Adrien Nader (adrien)
Status: In Progress
** Tags: update-excuse
--
You received this bug
Public bug reported:
libunwind 1.7.2 fails to build from source on arm64 and i386 and
introduces bugs in some programs. Version 1.8.1 fixes these issues but
hasn't been uploaded in Debian yet.
I don't think we need the update so I would simply wait for a change in
Debian rather than introduce a d
** Changed in: openssl (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2059101
Title:
Automatic EST certificate retrieval does not work on Ubuntu 22.04
To ma
I'm going to switch this to Won't fix since only on person seems to be
affected and they had a solution for them. I never found out who is the
other user affected on 2024-05-17. We can re-consider if I get
information from that user (it's really unfortunate that LP didn't
provide more insights)
**
Glad that you found a solution for your issue and thanks for the update.
** Summary changed:
- Openssl can't find libs and finally crashes on "missing shared library
libssl.so.1.0.0"
+ With splunk, openssl can't find libs and finally crashes on "missing shared
library libssl.so.1.0.0"
--
You
Hmm, I was perplexed with breezy and took another look at the report
above. I may have to re-open it but I'll see later on (maybe a few
days).
The issue in the logs is still maybe present but there are also fixes
for two FTBFS on python 3.13 waiting I think the effect of the new
openssl version sh
Breezy is not compatible with python 3.13; this is not related to
openssl 3.4. I'm preparing a PR for breezy on github right now.
** Changed in: breezy (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubu
* Changed in: python3.12 (Ubuntu)
Assignee: (unassigned) => Adrien Nader (adrien)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2092298
Title:
python3.12/3.13: incompatibility with openssl
I believe it has been fixed for python3.13 by 3.13.1-3 .
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2092298
Title:
python3.12/3.13: incompatibility with openssl 3.4
To manage notifications about
I've added specific affects entries for noble and oracular so that I
could mark
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/2092609 as
duplicate.
Fixing this for Noble would require an SRU obviously, which would have
to be staged to be picked up with some security update when that
happe
lar)
Assignee: (unassigned) => Adrien Nader (adrien)
** Changed in: openssl (Ubuntu Oracular)
Importance: Undecided => Medium
** Changed in: openssl (Ubuntu Noble)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is s
*** This bug is a duplicate of bug 1297025 ***
https://bugs.launchpad.net/bugs/1297025
** This bug has been marked a duplicate of bug 1297025
Either the changelog.gz is missing or there is an erroneous link in the
libssl1.0.0 package
--
You received this bug notification because you are
** Tags added: foundations-todo
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2092298
Title:
python3.12/3.13: incompatibility with openssl 3.4
To manage notifications about this bug go to:
https://
** Also affects: python3.13 (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2092298
Title:
python3.12/3.13: incompatibility with openssl 3.4
To ma
Public bug reported:
Python3.12 (and 3.13?) probably need to include the patches given through
https://github.com/python/cpython/pull/127361:
- python3.12: https://github.com/python/cpython/pull/127905
- python3.13: https://github.com/python/cpython/pull/127812
The upstream changes address repor
freedombox 24.25 has been uploaded with the fix that Julian linked to
but it currently FTBFS probably due to python-django.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2074186
Title:
pyopenssl: re
Public bug reported:
Changed exception.
** Affects: m2crypto (Ubuntu)
Importance: High
Assignee: Adrien Nader (adrien)
Status: In Progress
** Changed in: m2crypto (Ubuntu)
Status: New => Incomplete
** Changed in: m2crypto (Ubuntu)
Status: Incomplete =&
** Summary changed:
- m2crypto: FTBFS with openssl 3.4
+ m2crypto: FTBFS with openssl 3.4 as swig and gcc use different feature flags
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2091883
Title:
m2
** Description changed:
- Testsuite fails with openssl 3.4.
+ Openssl 3.4 has started returning an error for when calling
+ X509_REQ_set_version() with "1" which is not specified. However,
+ m2crypto was using that in its testsuite which now fails due to that.
** Summary changed:
- Testsuite fai
High
Assignee: Adrien Nader (adrien)
Status: In Progress
** Tags: update-excuse
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2091883
Title:
m2crypto: FTBFS with openssl 3.4
To m
Public bug reported:
Testsuite fails with openssl 3.4.
** Affects: m2crypto (Ubuntu)
Importance: High
Assignee: Adrien Nader (adrien)
Status: In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https
AFAIU the API issues for freedombox and python-oauth2client were not the
same. I can imagine having a single bug for these API removals in
pyopenssl since it looks like they're going to be pretty common but we
should have a separate diary entry in the bug description for each
removal that's problem
** Tags added: update-excuse
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2089065
Title:
rust-cargo-c: FTBFS on Plucky
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubun
I've prepared an MR+debdiff for rust-libgit2-sys :
https://code.launchpad.net/~adrien/ubuntu/+source/rust-
libgit2-sys/+git/rust-libgit2-sys/+merge/477805
Note that I've tested the build in a PPA to ensure there isn't an FTBFS.
--
You received this bug notification because you are a member of Ub
*** This bug is a duplicate of bug 2091023 ***
https://bugs.launchpad.net/bugs/2091023
** This bug has been marked a duplicate of bug 2091023
Please remove ruby3.1 and add to blocklist
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ub
** Changed in: plr (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2087739
Title:
plr: Please RM armhf binaries
To manage notifications about this bug go t
** Changed in: openssl (Ubuntu)
Status: Confirmed => In Progress
** Changed in: openssl (Ubuntu)
Milestone: None => ubuntu-25.04
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2066990
Title
** Changed in: openssl (Ubuntu)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2087955
Title:
openssl: merge 3.4.0-1 from Debian unstable
To manage notifi
** Changed in: pgauditlogtofile (Ubuntu)
Status: Incomplete => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2088006
Title:
Remove NBS 32-bit postgresql extension packages, part 4
To man
1 - 100 of 263 matches
Mail list logo