The mosquitto test seems to be failing regardless of the version of
openssl, I'll take a look at puma.

On Tue, Jul 27, 2021 at 1:35 PM Gunnar Hjalmarsson <
1931...@bugs.launchpad.net> wrote:

> @Simon: autopkgtest for mosquitto and puma fails on s390x.
>
> https://people.canonical.com/~ubuntu-archive/proposed-
> migration/update_excuses.html#openssl
>
> Please investigate.
>
> --
> You received this bug notification because you are a member of Canonical
> Foundations Team, which is a bug assignee.
> https://bugs.launchpad.net/bugs/1931994
>
> Title:
>   [Ubuntu 20.04] OpenSSL bugs im s390x AES code
>
> Status in Ubuntu on IBM z Systems:
>   In Progress
> Status in openssl package in Ubuntu:
>   Fix Committed
> Status in openssl source package in Bionic:
>   New
> Status in openssl source package in Focal:
>   New
> Status in openssl source package in Hirsute:
>   New
> Status in openssl source package in Impish:
>   Fix Committed
>
> Bug description:
>   Problem description:
>
>   When passing a NULL key to reset AES EVC state, the state wouldn't be
> completely reset on s390x.
>   https://github.com/openssl/openssl/pull/14900
>
>   Solution available here:
>
> https://github.com/openssl/openssl/commit/dc67210d909b5dd7a50f60a96f36f3f5a891b1c8
>
>   Should be applied to all distros where openssl 1.1.1 is included for
> consistency reason.
>   -> 21.10, 20.04, 18.04.
>   I think not needed for 16.04 anymore....
>
>   [Test plan]
>
>   $ sudo apt install libssl-dev
>   $ gcc test.c -o evc-test -lcrypto -lssl # See
> https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1931994/comments/2
> for the test.c program
>   $ ./evc-test && echo OK
>
>   [Where problems could occur]
>
>   This patch only touches s390x code paths, so there shouldn't be any
> regression on other architectures. However, on s390x this could reveal
>   latent bugs by spreading a NULL key to new code paths.
>
> To manage notifications about this bug go to:
> https://bugs.launchpad.net/ubuntu-z-systems/+bug/1931994/+subscriptions
>
>

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1931994

Title:
  [Ubuntu 20.04] OpenSSL bugs im s390x AES code

Status in Ubuntu on IBM z Systems:
  In Progress
Status in openssl package in Ubuntu:
  Fix Committed
Status in openssl source package in Bionic:
  New
Status in openssl source package in Focal:
  New
Status in openssl source package in Hirsute:
  New
Status in openssl source package in Impish:
  Fix Committed

Bug description:
  Problem description:

  When passing a NULL key to reset AES EVC state, the state wouldn't be 
completely reset on s390x.
  https://github.com/openssl/openssl/pull/14900

  Solution available here:
  
https://github.com/openssl/openssl/commit/dc67210d909b5dd7a50f60a96f36f3f5a891b1c8

  Should be applied to all distros where openssl 1.1.1 is included for 
consistency reason.
  -> 21.10, 20.04, 18.04.
  I think not needed for 16.04 anymore....

  [Test plan]

  $ sudo apt install libssl-dev
  $ gcc test.c -o evc-test -lcrypto -lssl # See 
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1931994/comments/2 for 
the test.c program
  $ ./evc-test && echo OK

  [Where problems could occur]

  This patch only touches s390x code paths, so there shouldn't be any 
regression on other architectures. However, on s390x this could reveal
  latent bugs by spreading a NULL key to new code paths.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1931994/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to