[Group.of.nepali.translators] [Bug 1858584] Re: xenial/linux-kvm: 4.4.0-1065.72 -proposed tracker

2020-01-09 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/prepare-package
   Status: In Progress => Fix Committed

** Changed in: kernel-sru-workflow/prepare-package
   Status: Fix Committed => Fix Released

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: In Progress => Fix Committed

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: Fix Committed => Fix Released

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  kernel-stable-master-bug: 1858594
  packages:
main: linux-kvm
meta: linux-meta-kvm
- phase: Packaging
- phase-changed: Friday, 10. January 2020 04:46 UTC
+ phase: Holding before Promote to Proposed
+ phase-changed: Friday, 10. January 2020 07:16 UTC
  reason:
-   prepare-package: Pending -- package not yet uploaded
-   prepare-package-meta: Pending -- package not yet uploaded
+   promote-to-proposed: Pending -- builds not complete in ppa main:queued
  variant: debs

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1858584

Title:
  xenial/linux-kvm: 4.4.0-1065.72 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-kvm package in Ubuntu:
  Invalid
Status in linux-kvm source package in Xenial:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1858594
  packages:
main: linux-kvm
meta: linux-meta-kvm
  phase: Holding before Promote to Proposed
  phase-changed: Friday, 10. January 2020 07:16 UTC
  reason:
promote-to-proposed: Pending -- builds not complete in ppa main:queued
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1858584/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1858802] Re: libblkid: no bcache UUID due to ambivalent detection of bcache and xfs_external_log for regular xfs in bcache backing device

2020-01-09 Thread Mauricio Faria de Oliveira
** Description changed:

- description/debdiffs to be provided.
+ [Impact]
  
- upstream commit:
- 
https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?id=d756af7d640c51ce8d1414607bd3f17eeecf2424
+  * Users with an XFS filesystem on top of bcache
+(this is seen on some ceph, cloud deployments)
+might fail to reference the bcache device by
+UUID or other udev properties.
+ 
+  * The journal of the regular XFS filesystem in
+the bcache device is incorrectly detected as
+an XFS external log; so two superblocks are
+detected (bcache and xfs_external_log).
+ 
+  * Thus blkid fails with ambivalent superblocks
+detected then doesn't provide the usual udev
+properties (UUID, etc.)
+ 
+  * The fix improves the probe function for XFS
+external log so it detects it's regular XFS
+and bails out.
+ 
+ [Test Case]
+ 
+  * See test steps detailed in comment #.
+- Create an XFS filesystem with the journal/log
+  in the beginning of the bcache device (< 256K).
+- Stop the bcache device.
+- Run '$ blkid -o udev -p $BCACHE_BACKING_DEVICE'.
+ 
+$ sudo make-bcache -B $BACKING_DEV
+$ sudo mkfs.xfs -d agsize=16m -l agnum=0 -f $BCACHE_DEV
+$ echo 1 | sudo tee /sys/block/$(basename $BCACHE_DEV)/bcache/stop
+$ sudo blkid -o udev -p $BACKING_DEV
+ 
+ [Regression Potential]
+ 
+  * The patch only changes the detection function
+for XFS external log to be more general about
+the sector where the magic of regular XFS may
+be found (which is shifted inside the bcache.)
+ 
+  * It still checks at sector zero (the only one
+checked previously), so this behavior didn't
+change.
+ 
+  * Possible regressions are actual XFS external
+log devices that are not anymore detected as
+such. (Although that would probably indicate
+a different bug in libblkid.)
+ 
+ [Other Info]
+  * upstream commit:
+
https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?id=d756af7d640c51ce8d1414607bd3f17eeecf2424

** Bug watch added: Debian Bug tracker #948444
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=948444

** Also affects: util-linux (Debian) via
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=948444
   Importance: Unknown
   Status: Unknown

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1858802

Title:
  libblkid: no bcache UUID due to ambivalent detection of bcache and
  xfs_external_log for regular xfs in bcache backing device

Status in util-linux package in Ubuntu:
  In Progress
Status in util-linux source package in Xenial:
  In Progress
Status in util-linux source package in Bionic:
  In Progress
Status in util-linux source package in Disco:
  In Progress
Status in util-linux source package in Eoan:
  In Progress
Status in util-linux source package in Focal:
  In Progress
Status in util-linux package in Debian:
  Unknown

Bug description:
  [Impact]

   * Users with an XFS filesystem on top of bcache
 (this is seen on some ceph, cloud deployments)
 might fail to reference the bcache device by
 UUID or other udev properties.

   * The journal of the regular XFS filesystem in
 the bcache device is incorrectly detected as
 an XFS external log; so two superblocks are
 detected (bcache and xfs_external_log).

   * Thus blkid fails with ambivalent superblocks
 detected then doesn't provide the usual udev
 properties (UUID, etc.)

   * The fix improves the probe function for XFS
 external log so it detects it's regular XFS
 and bails out.

  [Test Case]

   * See test steps detailed in comment #.
 - Create an XFS filesystem with the journal/log
   in the beginning of the bcache device (< 256K).
 - Stop the bcache device.
 - Run '$ blkid -o udev -p $BCACHE_BACKING_DEVICE'.

 $ sudo make-bcache -B $BACKING_DEV
 $ sudo mkfs.xfs -d agsize=16m -l agnum=0 -f $BCACHE_DEV
 $ echo 1 | sudo tee /sys/block/$(basename $BCACHE_DEV)/bcache/stop
 $ sudo blkid -o udev -p $BACKING_DEV

  [Regression Potential]

   * The patch only changes the detection function
 for XFS external log to be more general about
 the sector where the magic of regular XFS may
 be found (which is shifted inside the bcache.)

   * It still checks at sector zero (the only one
 checked previously), so this behavior didn't
 change.

   * Possible regressions are actual XFS external
 log devices that are not anymore detected as
 such. (Although that would probably indicate
 a different bug in libblkid.)

  [Other Info]
   * upstream commit:
 
https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?id=d756af7d640c51ce8d1414607bd3f17eeecf2424

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/util-linux/+bug/1858802/+subscriptions


[Group.of.nepali.translators] [Bug 1858581] Re: xenial/linux-aws: 4.4.0-1101.112 -proposed tracker

2020-01-09 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/automated-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: Fix Committed => Fix Released

** Changed in: kernel-sru-workflow/regression-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/security-signoff
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/verification-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/automated-testing
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/regression-testing
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/verification-testing
   Status: Confirmed => In Progress

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1858594
  packages:
main: linux-aws
meta: linux-meta-aws
- phase: Promote to Proposed
- phase-changed: Thursday, 09. January 2020 15:08 UTC
+ phase: Testing
+ phase-changed: Thursday, 09. January 2020 17:18 UTC
+ proposed-announcement-sent: true
+ proposed-testing-requested: true
  reason:
-   promote-to-proposed: Ongoing -- packages waiting in -proposed for mirror 
sync
+   automated-testing: Ongoing -- testing in progress
+   regression-testing: Ongoing -- testing in progress
+   security-signoff: Pending -- waiting for signoff
+   verification-testing: Ongoing -- testing in progress
  trackers:
xenial/linux-aws/aws-kernel: bug 1858580
  variant: debs

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1858581

Title:
  xenial/linux-aws: 4.4.0-1101.112 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  In Progress
Status in Kernel SRU Workflow security-signoff series:
  Confirmed
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux-aws package in Ubuntu:
  Invalid
Status in linux-aws source package in Xenial:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1858594
  packages:
main: linux-aws
meta: linux-meta-aws
  phase: Testing
  phase-changed: Thursday, 09. January 2020 17:18 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
automated-testing: Ongoing -- testing in progress
regression-testing: Ongoing -- testing in progress
security-signoff: Pending -- waiting for signoff
verification-testing: Ongoing -- testing in progress
  trackers:
xenial/linux-aws/aws-kernel: bug 1858580
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1858581/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1858802] Re: libblkid: no bcache UUID due to ambivalent detection of bcache and xfs_external_log for regular xfs in bcache backing device

2020-01-09 Thread Mauricio Faria de Oliveira
** Changed in: util-linux (Ubuntu Disco)
   Status: Invalid => In Progress

** Changed in: util-linux (Ubuntu Disco)
   Importance: Undecided => Medium

** Changed in: util-linux (Ubuntu Disco)
 Assignee: (unassigned) => Mauricio Faria de Oliveira (mfo)

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1858802

Title:
  libblkid: no bcache UUID due to ambivalent detection of bcache and
  xfs_external_log for regular xfs in bcache backing device

Status in util-linux package in Ubuntu:
  In Progress
Status in util-linux source package in Xenial:
  In Progress
Status in util-linux source package in Bionic:
  In Progress
Status in util-linux source package in Disco:
  In Progress
Status in util-linux source package in Eoan:
  In Progress
Status in util-linux source package in Focal:
  In Progress

Bug description:
  description/debdiffs to be provided.

  upstream commit:
  
https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?id=d756af7d640c51ce8d1414607bd3f17eeecf2424

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/util-linux/+bug/1858802/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1858594] Re: xenial/linux: 4.4.0-172.202 -proposed tracker

2020-01-09 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/automated-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/certification-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: Fix Committed => Fix Released

** Changed in: kernel-sru-workflow/regression-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/security-signoff
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/verification-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/automated-testing
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/regression-testing
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/verification-testing
   Status: Confirmed => In Progress

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
+ bugs-spammed: true
  packages:
main: linux
meta: linux-meta
signed: linux-signed
- phase: Promote to Proposed
- phase-changed: Thursday, 09. January 2020 09:37 UTC
+ phase: Testing
+ phase-changed: Thursday, 09. January 2020 16:08 UTC
+ proposed-announcement-sent: true
+ proposed-testing-requested: true
  reason:
-   promote-to-proposed: Ongoing -- packages waiting in -proposed for mirror 
sync
+   automated-testing: Ongoing -- testing in progress
+   certification-testing: Ongoing -- testing in progress
+   regression-testing: Ongoing -- testing in progress
+   security-signoff: Pending -- waiting for signoff
+   verification-testing: Ongoing -- testing in progress
  trackers:
trusty/linux-aws: bug 1858591
trusty/linux-lts-xenial: bug 1858592
xenial/linux-aws: bug 1858581
xenial/linux-cascade: bug 1858583
xenial/linux-fips: bug 1858589
xenial/linux-kvm: bug 1858584
xenial/linux-raspi2: bug 1858586
xenial/linux-snapdragon: bug 1858588
xenial/linux/caracalla-kernel: bug 1858577
xenial/linux/pc-kernel: bug 1858578
xenial/linux/stlouis-kernel: bug 1858579
  variant: debs

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1858594

Title:
  xenial/linux: 4.4.0-172.202 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  In Progress
Status in Kernel SRU Workflow security-signoff series:
  Confirmed
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  bugs-spammed: true
  packages:
main: linux
meta: linux-meta
signed: linux-signed
  phase: Testing
  phase-changed: Thursday, 09. January 2020 16:08 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
automated-testing: Ongoing -- testing in progress
certification-testing: Ongoing -- testing in progress
regression-testing: Ongoing -- testing in progress
security-signoff: Pending -- waiting for signoff
verification-testing: Ongoing -- testing in progress
  trackers:
trusty/linux-aws: bug 1858591
trusty/linux-lts-xenial: bug 1858592
xenial/linux-aws: bug 1858581
xenial/linux-cascade: bug 1858583
xenial/linux-fips: bug 1858589
xenial/linux-kvm: bug 1858584
xenial/linux-raspi2: bug 1858586
xenial/linux-snapdragon: bug 1858588
xenial/linux/caracalla-kernel: bug 1858577
xenial/linux/pc-kernel: bug 1858578
xenial/linux/stlouis-kernel: bug 1858579
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1858594/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to  

[Group.of.nepali.translators] [Bug 1858691] Re: Warning about using older GnuTLS versions for bionic

2020-01-09 Thread Marc Deslauriers
https://usn.ubuntu.com/4233-1/

** Changed in: gnutls28 (Ubuntu Xenial)
   Status: Confirmed => Fix Released

** Changed in: gnutls28 (Ubuntu Bionic)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1858691

Title:
  Warning about using older GnuTLS versions for bionic

Status in gnutls28 package in Ubuntu:
  Fix Released
Status in gnutls28 source package in Xenial:
  Fix Released
Status in gnutls28 source package in Bionic:
  Fix Released

Bug description:
  It seems that the current GnuTLS version in bionic is vulnerable to
  this https://mail.gnome.org/archives/distributor-
  list/2020-January/msg0.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnutls28/+bug/1858691/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1858802] Re: libblkid: no bcache UUID due to ambivalent detection of bcache and xfs_external_log for regular xfs in bcache backing device

2020-01-09 Thread Mauricio Faria de Oliveira
** Also affects: util-linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: util-linux (Ubuntu Disco)
   Importance: Undecided
   Status: New

** Also affects: util-linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: util-linux (Ubuntu Focal)
   Importance: Undecided
 Assignee: Mauricio Faria de Oliveira (mfo)
   Status: In Progress

** Also affects: util-linux (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Changed in: util-linux (Ubuntu Focal)
   Importance: Undecided => Medium

** Changed in: util-linux (Ubuntu Eoan)
   Status: New => In Progress

** Changed in: util-linux (Ubuntu Eoan)
   Importance: Undecided => Medium

** Changed in: util-linux (Ubuntu Eoan)
 Assignee: (unassigned) => Mauricio Faria de Oliveira (mfo)

** Changed in: util-linux (Ubuntu Disco)
   Status: New => Invalid

** Changed in: util-linux (Ubuntu Bionic)
   Status: New => In Progress

** Changed in: util-linux (Ubuntu Bionic)
   Importance: Undecided => Medium

** Changed in: util-linux (Ubuntu Bionic)
 Assignee: (unassigned) => Mauricio Faria de Oliveira (mfo)

** Changed in: util-linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: util-linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: util-linux (Ubuntu Xenial)
 Assignee: (unassigned) => Mauricio Faria de Oliveira (mfo)

** Tags added: sts sts-sponsor-mfo

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1858802

Title:
  libblkid: no bcache UUID due to ambivalent detection of bcache and
  xfs_external_log for regular xfs in bcache backing device

Status in util-linux package in Ubuntu:
  In Progress
Status in util-linux source package in Xenial:
  In Progress
Status in util-linux source package in Bionic:
  In Progress
Status in util-linux source package in Disco:
  Invalid
Status in util-linux source package in Eoan:
  In Progress
Status in util-linux source package in Focal:
  In Progress

Bug description:
  description/debdiffs to be provided.

  upstream commit:
  
https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?id=d756af7d640c51ce8d1414607bd3f17eeecf2424

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/util-linux/+bug/1858802/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1858691] Re: Warning about using older GnuTLS versions for bionic

2020-01-09 Thread Marc Deslauriers
** Also affects: gnutls28 (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: gnutls28 (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Information type changed from Private Security to Public Security

** Changed in: gnutls28 (Ubuntu Xenial)
   Status: New => Confirmed

** Changed in: gnutls28 (Ubuntu Bionic)
   Status: New => Confirmed

** Changed in: gnutls28 (Ubuntu Xenial)
 Assignee: (unassigned) => Marc Deslauriers (mdeslaur)

** Changed in: gnutls28 (Ubuntu Bionic)
 Assignee: (unassigned) => Marc Deslauriers (mdeslaur)

** Changed in: gnutls28 (Ubuntu)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1858691

Title:
  Warning about using older GnuTLS versions for bionic

Status in gnutls28 package in Ubuntu:
  Fix Released
Status in gnutls28 source package in Xenial:
  Confirmed
Status in gnutls28 source package in Bionic:
  Confirmed

Bug description:
  It seems that the current GnuTLS version in bionic is vulnerable to
  this https://mail.gnome.org/archives/distributor-
  list/2020-January/msg0.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnutls28/+bug/1858691/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1859013] [NEW] openssh tests use "not valid yet" certificate from 2020, which is now valid

2020-01-09 Thread Dimitri John Ledkov
Public bug reported:

openssh tests use "not valid yet" certificate from 2020, which is now
valid

https://anongit.mindrot.org/openssh.git/commit/?id=ff31f15773ee173502eec4d7861ec56f26bba381

this causes autopkgtest regression suite fail in 2020

 grep 20200101 -r .
./openssh-7.6p1/regress/cert-hostkey.sh:test_one "cert not yet valid"   failure 
"-h -V20200101:20300101"
./openssh-7.6p1/regress/cert-userkey.sh:test_one "cert not yet valid"   failure 
"-n ${USER} -V20200101:20300101"
./openssh-7.2p2/regress/cert-hostkey.sh:test_one "cert not yet valid"   failure 
"-h -V20200101:20300101"
./openssh-7.2p2/regress/cert-userkey.sh:test_one "cert not yet valid"   failure 
"-n ${USER} -V20200101:20300101"
./openssh-6.6p1/regress/cert-hostkey.sh:test_one "cert not yet valid"   failure 
"-h -V20200101:20300101"
./openssh-6.6p1/regress/cert-userkey.sh:test_one "cert not yet valid"   failure 
"-n ${USER} -V20200101:20300101"
./openssh-5.9p1/regress/cert-hostkey.sh:test_one "cert not yet valid"   failure 
"-h -V20200101:20300101"
./openssh-5.9p1/regress/cert-userkey.sh:test_one "cert not yet valid"   failure 
"-n ${USER} -V20200101:20300101"

fixed in debian https://tracker.debian.org/news/1092767/accepted-
openssh-181p1-4-source-into-unstable/

** Affects: openssh (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: openssh (Ubuntu Precise)
 Importance: Undecided
 Status: New

** Affects: openssh (Ubuntu Trusty)
 Importance: Undecided
 Status: New

** Affects: openssh (Ubuntu Xenial)
 Importance: Undecided
 Status: New

** Affects: openssh (Ubuntu Bionic)
 Importance: Undecided
 Status: New

** Affects: openssh (Ubuntu Disco)
 Importance: Undecided
 Status: New

** Affects: openssh (Ubuntu Eoan)
 Importance: Undecided
 Status: New

** Affects: openssh (Ubuntu Focal)
 Importance: Undecided
 Status: New


** Tags: update-excuse

** Tags added: update-excuse

** Description changed:

  openssh tests use "not valid yet" certificate from 2020, which is now
  valid
  
  
https://anongit.mindrot.org/openssh.git/commit/?id=ff31f15773ee173502eec4d7861ec56f26bba381
  
  this causes autopkgtest regression suite fail in 2020
+ 
+  grep 20200101 -r .
+ ./openssh-7.6p1/regress/cert-hostkey.sh:test_one "cert not yet valid" failure 
"-h -V20200101:20300101"
+ ./openssh-7.6p1/regress/cert-userkey.sh:test_one "cert not yet valid" failure 
"-n ${USER} -V20200101:20300101"
+ ./openssh-7.2p2/regress/cert-hostkey.sh:test_one "cert not yet valid" failure 
"-h -V20200101:20300101"
+ ./openssh-7.2p2/regress/cert-userkey.sh:test_one "cert not yet valid" failure 
"-n ${USER} -V20200101:20300101"
+ ./openssh-6.6p1/regress/cert-hostkey.sh:test_one "cert not yet valid" failure 
"-h -V20200101:20300101"
+ ./openssh-6.6p1/regress/cert-userkey.sh:test_one "cert not yet valid" failure 
"-n ${USER} -V20200101:20300101"
+ ./openssh-5.9p1/regress/cert-hostkey.sh:test_one "cert not yet valid" failure 
"-h -V20200101:20300101"
+ ./openssh-5.9p1/regress/cert-userkey.sh:test_one "cert not yet valid" failure 
"-n ${USER} -V20200101:20300101"

** Also affects: openssh (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: openssh (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: openssh (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: openssh (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: openssh (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Also affects: openssh (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: openssh (Ubuntu Disco)
   Importance: Undecided
   Status: New

** Description changed:

  openssh tests use "not valid yet" certificate from 2020, which is now
  valid
  
  
https://anongit.mindrot.org/openssh.git/commit/?id=ff31f15773ee173502eec4d7861ec56f26bba381
  
  this causes autopkgtest regression suite fail in 2020
  
-  grep 20200101 -r .
+  grep 20200101 -r .
  ./openssh-7.6p1/regress/cert-hostkey.sh:test_one "cert not yet valid" failure 
"-h -V20200101:20300101"
  ./openssh-7.6p1/regress/cert-userkey.sh:test_one "cert not yet valid" failure 
"-n ${USER} -V20200101:20300101"
  ./openssh-7.2p2/regress/cert-hostkey.sh:test_one "cert not yet valid" failure 
"-h -V20200101:20300101"
  ./openssh-7.2p2/regress/cert-userkey.sh:test_one "cert not yet valid" failure 
"-n ${USER} -V20200101:20300101"
  ./openssh-6.6p1/regress/cert-hostkey.sh:test_one "cert not yet valid" failure 
"-h -V20200101:20300101"
  ./openssh-6.6p1/regress/cert-userkey.sh:test_one "cert not yet valid" failure 
"-n ${USER} -V20200101:20300101"
  ./openssh-5.9p1/regress/cert-hostkey.sh:test_one "cert not yet valid" failure 
"-h -V20200101:20300101"
  ./openssh-5.9p1/regress/cert-userkey.sh:test_one "cert not yet valid" failure 
"-n ${USER} -V20200101:20300101"
+ 
+ fixed in debian 

[Group.of.nepali.translators] [Bug 1858581] Re: xenial/linux-aws: 4.4.0-1101.112 -proposed tracker

2020-01-09 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/prepare-package
   Status: In Progress => Fix Committed

** Changed in: kernel-sru-workflow/prepare-package
   Status: Fix Committed => Fix Released

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: In Progress => Fix Committed

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: Fix Committed => Fix Released

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  kernel-stable-master-bug: 1858594
  packages:
main: linux-aws
meta: linux-meta-aws
- phase: Packaging
- phase-changed: Thursday, 09. January 2020 10:51 UTC
+ phase: Holding before Promote to Proposed
+ phase-changed: Thursday, 09. January 2020 11:41 UTC
  reason:
-   prepare-package: Pending -- package not yet uploaded
-   prepare-package-meta: Pending -- package not yet uploaded
+   promote-to-proposed: Pending -- builds not complete in ppa 
main:building,meta:queued
  trackers:
xenial/linux-aws/aws-kernel: bug 1858580
  variant: debs

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1858581

Title:
  xenial/linux-aws: 4.4.0-1101.112 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-aws package in Ubuntu:
  Invalid
Status in linux-aws source package in Xenial:
  Confirmed

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1858594
  packages:
main: linux-aws
meta: linux-meta-aws
  phase: Holding before Promote to Proposed
  phase-changed: Thursday, 09. January 2020 11:41 UTC
  reason:
promote-to-proposed: Pending -- builds not complete in ppa 
main:building,meta:queued
  trackers:
xenial/linux-aws/aws-kernel: bug 1858580
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1858581/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp