This bug was fixed in the package ubuntu-advantage-tools - 36ubuntu0~24.04 --------------- ubuntu-advantage-tools (36ubuntu0~24.04) noble; urgency=medium
* Backport 36ubuntu0 to noble (LP: #2112382) ubuntu-advantage-tools (36ubuntu0) questing; urgency=medium * d/apparmor/ubuntu_pro_esm_cache.jinja2: use openssl abstraction in the apparmor profile * New upstream release 36: (LP: #2112382) - api: display all available valid CVEs - attach: relax the onlySeries directive, so users can attach onlySeries tokens to all releases older than the target release - cli: + anbox-cloud: update installation instructions + collect-logs: do not overwrite the output file if it exists + cve/cves: * return all affected packages for a cve (LP: #2111610) * handle the case where the vulnerability data doesn't exist for the Ubuntu release - fips: + enable --access-only for all fips related services (GH: #3441) + allow enablement even when the -updates pocket is not available in the system (GH: #3439) -- Renan Rodrigo <renanrodr...@canonical.com> Tue, 24 Jun 2025 09:20:12 -0300 ** Changed in: ubuntu-advantage-tools (Ubuntu Jammy) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/2112382 Title: [SRU] ubuntu-advantage-tools (35.1 -> 36) Xenial, Bionic, Focal, Jammy, Noble, Oracular, Plucky Status in ubuntu-advantage-tools package in Ubuntu: Fix Released Status in ubuntu-advantage-tools source package in Xenial: Fix Released Status in ubuntu-advantage-tools source package in Bionic: Fix Released Status in ubuntu-advantage-tools source package in Focal: Fix Released Status in ubuntu-advantage-tools source package in Jammy: Fix Released Status in ubuntu-advantage-tools source package in Noble: Fix Released Status in ubuntu-advantage-tools source package in Oracular: Fix Released Status in ubuntu-advantage-tools source package in Plucky: Fix Released Bug description: [ Impact ] This release brings both bug-fixes and new features for the Pro Client, and we would like to make sure all of our supported customers have access to these improvements on all releases. The most important change is: We are relaxing the onlySeries directive interpretation. This is a special type of token that was designed to allow attach in a single release. For example, a onlySeries Jammy token could only attach to Jammy (not Noble, not Focal, not anything else). However, this is not how the feature was supposed to work - expectation now is that a onlySeries Jammy token can be used in Jammy *or earlier*. So attaching with it on Focal is fine, but on Noble it should still not work. [ Test Plan ] The following development and SRU process was followed: https://wiki.ubuntu.com/UbuntuAdvantageToolsUpdates The Pro Client developers will be in charge of attaching the artifacts of the appropriate test runs to the bug, and will not mark ‘verification-done’ until this has happened. [ Where problems could occur ] The change to onlySeries is the one that calls for more attention, as mistakes there could lead to many different unwanted scenarios: a) Users not being able to use onlySeries tokens at all b) Users being able to use onlySeries tokens to attach to any series c) Attached machines getting detached because of the rule change d) Users not being able to update to a supported release to a subsequent supported release e) Users being able to update from a supported release to an unsupported release The unlikeliness of a), c) and d) is based on the code change making the check for onlySeries less restrictive than the older check. There seems to be no use case or scenario where a machine would *lose* Pro access after this change, whether by not being able to attach to being detached. b) and e) would be cases where loosening the check would go too far. Besides manual checking, the scenarios above are tested in the new and modified integration tests, executed as part of the validation for this SRU. Another important implementation decision to be noted is that often times in older releases, there is no registry of the new ones in distro-info-data. For example, on Jammy it's possible to get the data for Xenial or Bionic, but on Xenial there is no information about Jammy. As the restriction to the onlySeries token is for future releases, we consider any release that is *not found* in the distro-info-data as a future release, and block the token usage. This was tested and works as expected, but it relies: - on distro-info-data correctness, which we can assume given the importance of the distro-info package - on the backend always setting the correct values for the onlySeries field when defining the tokens. A simple typo there would render the tokens completely useless. Strict validation is in place in the backend to make sure this does not happen. There is a change in the apparmor profile for esm_cache in this release, and apparmor is a good suspect of things going in unexpected ways. However, this change here is to use a proper abstraction for openssl, which is the correct approach. We have tests for the service, and will keep an eye on -proposed to make sure no regression happens there. FIPS-related services can now be enabled using --access-only, which means getting access to the repositories without actually installing the packages. Users can use this without proper care, and think their systems are FIPS-enabled when it's actually not. To mitigate this impression, we are adding a warning state to FIPS-related services when the entitlement itself is enabled but the ubuntu-fips metapackage (or one of the cloud variants) is not installed. The above warning won't work (for now) in containers though, where the FIPS service will still show as enabled even if --access-only was passed when enabling. We don't consider this a regression in --access- only because the same happens with realtime-kernel, for instance, which appears as enabled when the repository access is given and there is no RT kernel in the system. We don't consider this a regression for FIPS services because today if you enable FIPS in a container but the host does not run a FIPS service, you don't actually have FIPS in place but the status says it's enabled. In the end, in all cases, the user needs to know what they are doing. Documentation is our best friend. [ Changelog ] ubuntu-advantage-tools (36ubuntu0) questing; urgency=medium * d/apparmor/ubuntu_pro_esm_cache.jinja2: use openssl abstraction in the apparmor profile * New upstream release 36: (LP: #2112382) - api: display all available valid CVEs - attach: relax the onlySeries directive, so users can attach onlySeries tokens to all releases older than the target release - cli: + anbox-cloud: update installation instructions + collect-logs: do not overwrite the output file if it exists + cve/cves: * return all affected packages for a cve (LP: #2111610) * handle the case where the vulnerability data doesn't exist for the Ubuntu release - fips: + enable --access-only for all fips related services (GH: #3441) + allow enablement even when the -updates pocket is not available in the system (GH: #3439) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/2112382/+subscriptions _______________________________________________ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp