[Bug 1959855] Re: FTBFS against openssl 3
** Changed in: validns (Ubuntu) Assignee: (unassigned) => Simon Chopin (schopin) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959855 Title: FTBFS against openssl 3 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/validns/+bug/1959855/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959421] Re: [22.04 FEAT] Upgrade libica to latest version (crypto) (v4.0)
Currently waiting for https://bugs.launchpad.net/bugs/1960004 to be fixed before uploading libica, the new openssl-ibmca and a rebuild of opencryptoki. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959421 Title: [22.04 FEAT] Upgrade libica to latest version (crypto) (v4.0) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959421/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959855] Re: FTBFS against openssl 3
** Tags added: transition-openssl3-jj -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959855 Title: FTBFS against openssl 3 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/validns/+bug/1959855/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959421] Re: [22.04 FEAT] Upgrade libica to latest version (crypto) (v4.0)
** Changed in: libica (Ubuntu) Assignee: Frank Heimes (fheimes) => Simon Chopin (schopin) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959421 Title: [22.04 FEAT] Upgrade libica to latest version (crypto) (v4.0) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959421/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1957932] Re: [MIR] rustc, cargo
** Description changed: [Availability] The packages rustc and cargo are already in Ubuntu universe. The packages build for the architectures they are designed to work on, and are also built on platform with lesser upstream support, see https://doc.rust-lang.org/nightly/rustc/platform-support.html for details. They currently build and works for architectures: * amd64 * arm64 * armhf * i386 * ppc64el * riscv64 * s390x Link to packages: https://launchpad.net/ubuntu/+source/rustc https://launchpad.net/ubuntu/+source/cargo [Rationale] The packages rustc and cargo are required in Ubuntu main as the Rust programming language is gaining in popularity, and those two packages are, respectively, its main compiler implementation and its dedicated build tool (and dependency manager). There are a few packages in main already that have partially switched to Rust as their implementation language, and so rustc and cargo will be needed to keep us in sync with their upstream. See for instance https://bugs.launchpad.net/ubuntu/+source/mdevctl/+bug/1942394 and https://lists.debian.org/debian-python/2021/12/msg0.html (python-cryptography is in main) Note that the huge majority of our users will not use these packages, their purpose is to be a build-dependency for other packages. In particular, it is not particularly expected at this stage that those of our users that are Rust developers, which usually rely on their toolchain being managed in their $HOME by the `rustup` tool. [Security] cargo and rustc had 19 recorded security issues in the past, mostly in the Rust standard library (1 affecting cargo): https://nvd.nist.gov/vuln/search/results?form_type=Advanced_type=overview_type=all=false_vendor=cpe%3A%2F%3Arust- lang_product=cpe%3A%2F%3A%3Arust All issues are usually handled promptly by the Rust team. However, the fixes are rarely (if ever) backported to previous releases besides an occasional 1.X.1 point release for the latest stable. There is an official Rust Security working group that curates a database of security issues within the Rust ecosystem, including rustc/cargo: https://github.com/rustsec/advisory-db - no `suid` or `sgid` binaries - no executables in `/sbin` and `/usr/sbin` - Package does not install services, timers or recurring jobs - Packages does not open privileged ports (ports < 1024) - Packages does not contain extensions to security-sensitive software (filters, scanners, plugins, UI skins, ...) Note however that in typical use, building a project with cargo+rustc involves executing code that has been downloaded from crates.io: cargo builds and executes the `build.rs` file for any pre-compilation task (a bit like a Makefile), and any use of a proc macro dependency basically implies running arbitrary code (the macro) within the execution context of rustc. [Quality assurance - function/usage] The packages work well right after install, one can easily create a simple Rust project and run it. [Quality assurance - maintenance] The packages do not deal with exotic hardware we cannot support [Quality assurance - testing] The packages both run a test suite on build time. However, the rustc test suite - does NOT make the build fail. - - TODO: check with mwhudson *why*? + does NOT make the build fail. The reason is that there are always a few tests that fail, and it was a tradeoff made due to limited resources. Please note that Debian has a strategy of only failing the build if there are *too many* errors. As the Foundations team commits more resources on this toolchain, this policy will probably be revisited. Neither package has any autopkgtests. TODO: cargo autopkgtest that creates a new crate, adds a simple dependency (anyhow is a good candidate, no transitive deps), vendors it, builds the binary from the vendored crate, and runs it. [Quality assurance - packaging] debian/watch is present and works rustc yields quite a bit of lintian output, but they seem mostly harmless. https://lintian.debian.org/sources/rustc There are lintian overrides present, but those are usually justified in the override files themselves. cargo is a bit more tame on the warning fronts https://lintian.debian.org/sources/cargo It has an override file for the source package, for relatively minor warnings. These packages does not rely on obsolete or about to be demoted packages. The packages will not be installed by default The packaging is fairly complex, especially in the case of rustc. The crux of the complexity can be attributed to the boostrapping issue, as well as the need to deal with vendored dependencies. There is extensive documentation within the debian/ directories to help with the difficulties, and a lot of things have been automated in scripts living in
[Bug 1959315] Re: autopackage tests fail
Uploaded. I took the liberty of adding a line to the changelog to mention the dropped patch. ** Changed in: aiocoap (Ubuntu) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959315 Title: autopackage tests fail To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/aiocoap/+bug/1959315/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959622] Re: FTBFS against openssl 3.0
Uploaded, thanks! ** Changed in: hydra (Ubuntu) Status: Confirmed => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959622 Title: FTBFS against openssl 3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/hydra/+bug/1959622/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959315] Re: autopackage tests fail
** Changed in: aiocoap (Ubuntu) Assignee: (unassigned) => Simon Chopin (schopin) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959315 Title: autopackage tests fail To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/aiocoap/+bug/1959315/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959622] Re: FTBFS against openssl 3.0
** Changed in: hydra (Ubuntu) Assignee: (unassigned) => Simon Chopin (schopin) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959622 Title: FTBFS against openssl 3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/hydra/+bug/1959622/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959572] Re: glirc: FTBFS against OpenSSL 3.0
After a discussion with a member of the Debian Haskell team, the simplest solution is to backport the OpenSSL 3.0 patch from upstream. ** Changed in: haskell-hsopenssl (Ubuntu) Status: New => Fix Committed ** Changed in: glirc (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959572 Title: glirc: FTBFS against OpenSSL 3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/glirc/+bug/1959572/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959572] [NEW] glirc: FTBFS against OpenSSL 3.0
Public bug reported: The package fails to build against OpenSSL 3.0, due to lack of support in the Haskell package haskell-hlopenssl. ** Affects: glirc (Ubuntu) Importance: Undecided Status: Invalid ** Affects: haskell-hsopenssl (Ubuntu) Importance: Undecided Status: Fix Committed ** Tags: transiton-openssl3-jj ** Also affects: haskell-hsopenssl (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959572 Title: glirc: FTBFS against OpenSSL 3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/glirc/+bug/1959572/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959426] [NEW] lua-luaossl: FTBFS against OpenSSL 3.0
Public bug reported: This package fails to build against OpenSSL 3.0, as it uses constants that are no longer defined in OpenSSL 3.0. I'll upload a version where those values aren't exported at all, as a search through codesearch.debian.net didn't turn up any usage for them in the archive. ** Affects: lua-luaossl (Ubuntu) Importance: Undecided Status: New ** Tags: transition-openssl3-jj -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959426 Title: lua-luaossl: FTBFS against OpenSSL 3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lua-luaossl/+bug/1959426/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959414] [NEW] Please remove tpm2-tss-engine from Jammy
Public bug reported: This package isn't intended to work with OpenSSL 3.0, and should thus be removed from Jammy since we're aiming for libssl 1.1 removal. It has no reverse-dependencies: ❯ reverse-depends src:tpm2-tss-engine -a source No reverse dependencies found ❯ reverse-depends src:tpm2-tss-engine No reverse dependencies found ** Affects: tpm2-tss-engine (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959414 Title: Please remove tpm2-tss-engine from Jammy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/tpm2-tss-engine/+bug/1959414/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1958090] Re: Kate: navigation keys do not cancel mark
Allright, I uploaded the package to Jammy. Thanks! ** Changed in: ktexteditor (Ubuntu) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1958090 Title: Kate: navigation keys do not cancel mark To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ktexteditor/+bug/1958090/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1958090] Re: Kate: navigation keys do not cancel mark
** Changed in: ktexteditor (Ubuntu) Assignee: Heinrich Schuchardt (xypron) => Simon Chopin (schopin) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1958090 Title: Kate: navigation keys do not cancel mark To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ktexteditor/+bug/1958090/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1958090] Re: Kate: navigation keys do not cancel mark
Technically, this fix breaks the ABI of libkf5texteditor5 since the patch removes a public symbol. This isn't a huge issue since the symbol has never been present in a released version of Ubuntu, but could you check that nothing in the archive uses it? I believe *someone* in #ubuntu-release has some tooling to check the sources for the entire archive. You might also want to check in with the Kubuntu folks. ** Changed in: ktexteditor (Ubuntu) Assignee: Simon Chopin (schopin) => Heinrich Schuchardt (xypron) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1958090 Title: Kate: navigation keys do not cancel mark To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ktexteditor/+bug/1958090/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1958090] Re: Kate: navigation keys do not cancel mark
** Changed in: ktexteditor (Ubuntu) Assignee: Heinrich Schuchardt (xypron) => Simon Chopin (schopin) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1958090 Title: Kate: navigation keys do not cancel mark To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ktexteditor/+bug/1958090/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959095] [NEW] breezy FTBFS due to deprecation warning in paramiko
Public bug reported: The version in -proposed currently FTBFS because of some deprecation warnings introduced in Python3.10 raised by code in paramiko. ** Affects: breezy (Ubuntu) Importance: Undecided Status: New ** Affects: paramiko (Ubuntu) Importance: Undecided Status: New ** Tags: ftbfs update-excuse ** Patch added: "paramiko.debdiff" https://bugs.launchpad.net/bugs/1959095/+attachment/5557602/+files/paramiko.debdiff ** Also affects: paramiko (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959095 Title: breezy FTBFS due to deprecation warning in paramiko To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/breezy/+bug/1959095/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959095] Re: breezy FTBFS due to deprecation warning in paramiko
Above is a patch for paramiko. Note that this transitively blocks lintian from migrating to the release pocket. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959095 Title: breezy FTBFS due to deprecation warning in paramiko To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/breezy/+bug/1959095/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959002] Re: Blacklist and remove lintian-brush from the archive
For the record, my request originated from the recurrence of lintian- brush in update-excuses, as was noted in this comment: https://lists.ubuntu.com/archives/ubuntu-devel/2021-December/041754.html Regarding the rdeps: To be noted, both silver-platter and routine-update have no further rdeps: ❯ reverse-depends src:silver-platter ❯ reverse-depends -a source src:silver-platter No reverse dependencies found ❯ reverse-depends src:routine-update No reverse dependencies found ❯ reverse-depends -a source routine-update No reverse dependencies found routine-update appears functional on a typical Salsa repository, but chokes with repositories managed by git-ubuntu. silverplatter uses lintian-brush in its debian-svp variant, which presumably has the same shortcomings than routine-update. I didn't test it out, though. Both tools are thus probably not that useful in typical Ubuntu work, being more suited for direct Debian contributions, and should be removed alongside lintian-brush as the latter gives us the bulk of the interesting features. HOWEVER I looked a bit closer into lintian-brush code as well as its history in various +1 maintenance reports, and it seems most of its issues are related to src:breezy or the Python transition. The code is in good shape, and isn't as tied to lintian internals as I feared. For reference, here are the rdeps of src:breezy: ❯ reverse-depends src:breezy Reverse-Recommends * ikiwiki (for brz) * silver-platter(for brz) * ubuntu-dev-tools (for brz) Reverse-Depends * brz-debian(for brz) * brz-debian(for python3-breezy) * bzr (for brz) * bzr-doc (for brz-doc) * bzr-email (for brz) * bzr-fastimport(for brz) * bzr-git (for brz) * bzr-stats (for brz) * bzr-upload(for brz) * bzrtools (for brz) * etckeeper (for brz) * lintian-brush (for python3-breezy) * loggerhead(for python3-breezy) * lptools (for python3-breezy) * qbrz (for python3-breezy) * silver-platter(for python3-breezy) After investigating, I'm less inclined to remove the package from the archive, as it's more of a symptom of an issue with src:breezy. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959002 Title: Blacklist and remove lintian-brush from the archive To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lintian-brush/+bug/1959002/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1955009] Re: Freeradius 3.0.21+dfsg-3build1 fails test of moonshot-gss-eap
** Tags added: transition-openssl3-jj -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1955009 Title: Freeradius 3.0.21+dfsg-3build1 fails test of moonshot-gss-eap To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/freeradius/+bug/1955009/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1957932] Re: [MIR] rustc, cargo
** Description changed: [Availability] The packages rustc and cargo are already in Ubuntu universe. The packages build for the architectures they are designed to work on, and are also built on platform with lesser upstream support, see https://doc.rust-lang.org/nightly/rustc/platform-support.html for details. They currently build and works for architectures: * amd64 * arm64 * armhf * i386 * ppc64el * riscv64 * s390x Link to packages: https://launchpad.net/ubuntu/+source/rustc https://launchpad.net/ubuntu/+source/cargo [Rationale] The packages rustc and cargo are required in Ubuntu main as the Rust programming language is gaining in popularity, and those two packages are, respectively, its main compiler implementation and its dedicated build tool (and dependency manager). There are a few packages in main already that have partially switched to Rust as their implementation language, and so rustc and cargo will be needed to keep us in sync with their upstream. See for instance https://bugs.launchpad.net/ubuntu/+source/mdevctl/+bug/1942394 and https://lists.debian.org/debian-python/2021/12/msg0.html (python-cryptography is in main) Note that the huge majority of our users will not use these packages, their purpose is to be a build-dependency for other packages. In particular, it is not particularly expected at this stage that those of our users that are Rust developers, which usually rely on their toolchain being managed in their $HOME by the `rustup` tool. [Security] cargo and rustc had 19 recorded security issues in the past, mostly in the Rust standard library (1 affecting cargo): https://nvd.nist.gov/vuln/search/results?form_type=Advanced_type=overview_type=all=false_vendor=cpe%3A%2F%3Arust- lang_product=cpe%3A%2F%3A%3Arust All issues are usually handled promptly by the Rust team. However, the fixes are rarely (if ever) backported to previous releases besides an occasional 1.X.1 point release for the latest stable. There is an official Rust Security working group that curates a database of security issues within the Rust ecosystem, including rustc/cargo: https://github.com/rustsec/advisory-db - no `suid` or `sgid` binaries - no executables in `/sbin` and `/usr/sbin` - Package does not install services, timers or recurring jobs - Packages does not open privileged ports (ports < 1024) - Packages does not contain extensions to security-sensitive software (filters, scanners, plugins, UI skins, ...) Note however that in typical use, building a project with cargo+rustc involves executing code that has been downloaded from crates.io: cargo builds and executes the `build.rs` file for any pre-compilation task (a bit like a Makefile), and any use of a proc macro dependency basically implies running arbitrary code (the macro) within the execution context of rustc. [Quality assurance - function/usage] The packages work well right after install, one can easily create a simple Rust project and run it. [Quality assurance - maintenance] The packages do not deal with exotic hardware we cannot support [Quality assurance - testing] The packages both run a test suite on build time. However, the rustc test suite does NOT make the build fail. TODO: check with mwhudson *why*? Neither package has any autopkgtests. TODO: cargo autopkgtest that creates a new crate, adds a simple dependency (anyhow is a good candidate, no transitive deps), vendors it, builds the binary from the vendored crate, and runs it. [Quality assurance - packaging] debian/watch is present and works rustc yields quite a bit of lintian output, but they seem mostly harmless. https://lintian.debian.org/sources/rustc There are lintian overrides present, but those are usually justified in the override files themselves. cargo is a bit more tame on the warning fronts https://lintian.debian.org/sources/cargo It has an override file for the source package, for relatively minor warnings. These packages does not rely on obsolete or about to be demoted packages. The packages will not be installed by default The packaging is fairly complex, especially in the case of rustc. The crux of the complexity can be attributed to the boostrapping issue, as well as the need to deal with vendored dependencies. There is extensive documentation within the debian/ directories to help with the difficulties, and a lot of things have been automated in scripts living in debian/scripts/* Note that originally, the upstream tarball for rustc includes the sources for cargo as well as its vendored dependencies, but the Debian Rust team chose to split it out in its own package. [UI standards] I do not believe there's a need for translation for these applications given the stated purpose for having them
[Bug 1959004] Re: lintian: remove unused non-main dependency libio-prompt-tiny-perl
Attached is a debdiff to fix this. The package builds fine and I was able to run lintian on several .changes files lying around my work directory without any issue. ** Patch added: "lintian.debdiff" https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1959004/+attachment/5557365/+files/lintian.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959004 Title: lintian: remove unused non-main dependency libio-prompt-tiny-perl To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1959004/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959004] [NEW] lintian: remove unused non-main dependency libio-prompt-tiny-perl
Public bug reported: The 2.111.0 version of lintian depends on libio-prompt-tiny-perl which is currently in Universe. This blocks the package from migrating until the MIR is completed. However, this dependency is actually unused in the binary package, as the scripts that use it aren't shipped yet. I'm assuming the dependency is there on a provisional basis, but it's actually blocking for us. ** Affects: lintian (Ubuntu) Importance: High Status: New ** Tags: update-excuse -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959004 Title: lintian: remove unused non-main dependency libio-prompt-tiny-perl To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1959004/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959002] [NEW] Blacklist and remove lintian-brush from the archive
Public bug reported: Hi, Would it be possible to remove and blacklist lintian-brush from the archive? This package isn't useful for Ubuntu, and seems to keep getting in the way of some transitions, i.e. lintian. Thanks in advance! ** Affects: lintian-brush (Ubuntu) Importance: Wishlist Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959002 Title: Blacklist and remove lintian-brush from the archive To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lintian-brush/+bug/1959002/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1957100] Re: Merge lintian 2.114.0 from Debian unstable
As usual, you'll find the resulting package uploaded to my PPA: https://launchpad.net/~schopin/+archive/ubuntu/test-ppa/+sourcepub/13222724/+listing-archive-extra Just pop the ~ppaX changelog entries, and voilà. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1957100 Title: Merge lintian 2.114.0 from Debian unstable To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1957100/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1957100] Re: Merge lintian 2.114.0 from Debian unstable
Updated debdiff against Ubuntu version. ** Patch added: "lintian_ubuntu.debdiff" https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1957100/+attachment/5557293/+files/lintian_ubuntu.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1957100 Title: Merge lintian 2.114.0 from Debian unstable To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1957100/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1957100] Re: Merge lintian 2.114.0 from Debian unstable
Updated debdiff against Debian, with a new change removing an unused, non-MIRed dependency. ** Patch added: "lintian_debian.debdiff" https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1957100/+attachment/5557292/+files/lintian_debian.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1957100 Title: Merge lintian 2.114.0 from Debian unstable To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1957100/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1946014] Re: ovn: Fail to build against OpenSSL 3.0
I'm guessing this has been solved, since the binaries in the release pocket are linked against libssl3 :) ** Changed in: ovn (Ubuntu) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1946014 Title: ovn: Fail to build against OpenSSL 3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ovn/+bug/1946014/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1958881] [NEW] Sync erlang 1:24.2+dfsg-1 (main) from Debian unstable (main)
Public bug reported: Please sync erlang 1:24.2+dfsg-1 (main) from Debian unstable (main) Explanation of the Ubuntu delta and why it can be dropped: * Backport the OpenSSL 3 patchset from upstream (LP: #1945768) Upstream has OpenSSL 3.0 support from the 24.2 branch onward, see https://github.com/erlang/otp/releases/tag/OTP-24.2 Our backport patches are thus no longer needed :) Changelog entries since current jammy version 1:24.1.5+dfsg-1ubuntu1: erlang (1:24.2+dfsg-1) unstable; urgency=medium * New upstream release. * Refresh patches. -- Sergei Golovan Wed, 15 Dec 2021 19:39:20 +0300 erlang (1:24.1.7+dfsg-1) unstable; urgency=medium * New upstream release. -- Sergei Golovan Fri, 10 Dec 2021 12:51:44 +0300 ** Affects: erlang (Ubuntu) Importance: Wishlist Status: New ** Changed in: erlang (Ubuntu) Importance: Undecided => Wishlist -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1958881 Title: Sync erlang 1:24.2+dfsg-1 (main) from Debian unstable (main) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/erlang/+bug/1958881/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1951065] Re: [MIR] libio-prompt-tiny-perl
I opened a Debian bug here: https://bugs.debian.org/1004286 Note that apparently the scripts with the prompt are not actually shipped with Lintian just yet, so I might just drop the dependency in https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1957100 as a temporary new delta. ** Bug watch added: Debian Bug tracker #1004286 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004286 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1951065 Title: [MIR] libio-prompt-tiny-perl To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libio-prompt-tiny-perl/+bug/1951065/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1958419] Re: [22.04 FEAT] [LDP2025] Upgrade openssl-ibmca to latest version (crypto) (2.2.1)
Uploaded this version with the 3DES-EBC test disabled. ** Changed in: openssl-ibmca (Ubuntu) Status: Confirmed => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1958419 Title: [22.04 FEAT] [LDP2025] Upgrade openssl-ibmca to latest version (crypto) (2.2.1) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1958419/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1958419] Re: [22.04 FEAT] [LDP2025] Upgrade openssl-ibmca to latest version (crypto) (2.2.1)
OK, so I've managed to fix *most* of the tests, but the 3DES-ECB one still fails. I'm still investigating it, but the investigation is a bit slow due to having to go through a PPA every time I change something :) I'm using https://launchpad.net/~schopin/+archive/ubuntu/test- ppa/+packages for those following at home. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1958419 Title: [22.04 FEAT] [LDP2025] Upgrade openssl-ibmca to latest version (crypto) (2.2.1) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1958419/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1958419] Re: [22.04 FEAT] [LDP2025] Upgrade openssl-ibmca to latest version (crypto) (2.2.1)
Nice work. I'll try to fix the tests and fully enable them at build time, then if I succeed I'll upload the result to the archive. However, I'd rather not upload a package with known test failures. ** Changed in: openssl-ibmca (Ubuntu) Assignee: Frank Heimes (fheimes) => Simon Chopin (schopin) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1958419 Title: [22.04 FEAT] [LDP2025] Upgrade openssl-ibmca to latest version (crypto) (2.2.1) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1958419/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1958244] [NEW] Sync acl 2.3.1-1 (main) from Debian unstable (main)
Public bug reported: Please sync acl 2.3.1-1 (main) from Debian unstable (main) Explanation of the Ubuntu delta and why it can be dropped: * No-change rebuild to build packages with zstd compression. * Build with -fno-strict-aliasing * No-change rebuild to drop the udeb package. The aliasing issue has been fixed upstream, see https://git.savannah.nongnu.org/cgit/acl.git/commit/?id=cad5d69545765e00715d0cb0c88a3b4c20a59c1e Changelog entries since current jammy version 2.2.53-10ubuntu2: acl (2.3.1-1) unstable; urgency=medium * New upstream release. - Remove upstream patches included in this release. - Refresh remaining patches. - Update upstream signing key. * Add support for the noudeb build profile. -- Guillem Jover Sun, 29 Aug 2021 16:26:27 +0200 ** Affects: acl (Ubuntu) Importance: Wishlist Status: New ** Changed in: acl (Ubuntu) Importance: Undecided => Wishlist -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1958244 Title: Sync acl 2.3.1-1 (main) from Debian unstable (main) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/acl/+bug/1958244/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1957170] Re: libio-socket-ssl-perl depends on obsolete libssl1.1
gregoa uploaded this patch to Debian, and the new version has been synced over to -proposed. Marking as Fix Committed, unsubscribing Sponsors. ** Changed in: libio-socket-ssl-perl (Ubuntu) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1957170 Title: libio-socket-ssl-perl depends on obsolete libssl1.1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libio-socket-ssl-perl/+bug/1957170/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1957932] Re: MIR: rustc, cargo
** Changed in: cargo (Ubuntu) Status: New => Incomplete ** Changed in: rustc (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1957932 Title: MIR: rustc, cargo To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cargo/+bug/1957932/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1957932] [NEW] MIR: rustc, cargo
Public bug reported: [Availability] The packages rustc and cargo are already in Ubuntu universe. The packages build for the architectures they are designed to work on, and are also built on platform with lesser upstream support, see https://doc.rust-lang.org/nightly/rustc/platform-support.html for details. They currently build and works for architectures: * amd64 * arm64 * armhf * i386 * ppc64el * riscv64 * s390x Link to packages: https://launchpad.net/ubuntu/+source/rustc https://launchpad.net/ubuntu/+source/cargo [Rationale] The packages rustc and cargo are required in Ubuntu main as the Rust programming language is gaining in popularity, and those two packages are, respectively, its main compiler implementation and its dedicated build tool (and dependency manager). There are a few packages in main already that have partially switched to Rust as their implementation language, and so rustc and cargo will be needed to keep us in sync with their upstream. See for instance https://bugs.launchpad.net/ubuntu/+source/mdevctl/+bug/1942394 and https://lists.debian.org/debian-python/2021/12/msg0.html (python-cryptography is in main) Note that the huge majority of our users will not use these packages, their purpose is to be a build-dependency for other packages. In particular, it is not particularly expected at this stage that those of our users that are Rust developers, which usually rely on their toolchain being managed in their $HOME by the `rustup` tool. [Security] cargo and rustc had 19 recorded security issues in the past, mostly in the Rust standard library (1 affecting cargo): https://nvd.nist.gov/vuln/search/results?form_type=Advanced_type=overview_type=all=false_vendor=cpe%3A%2F%3Arust- lang_product=cpe%3A%2F%3A%3Arust All issues are usually handled promptly by the Rust team. However, the fixes are rarely (if ever) backported to previous releases besides an occasional 1.X.1 point release for the latest stable. There is an official Rust Security working group that curates a database of security issues within the Rust ecosystem, including rustc/cargo: https://github.com/rustsec/advisory-db - no `suid` or `sgid` binaries - no executables in `/sbin` and `/usr/sbin` - Package does not install services, timers or recurring jobs - Packages does not open privileged ports (ports < 1024) - Packages does not contain extensions to security-sensitive software (filters, scanners, plugins, UI skins, ...) Note however that in typical use, building a project with cargo+rustc involves executing code that has been downloaded from crates.io: cargo builds and executes the `build.rs` file for any pre-compilation task (a bit like a Makefile), and any use of a proc macro dependency basically implies running arbitrary code (the macro) within the execution context of rustc. [Quality assurance - function/usage] The packages work well right after install, one can easily create a simple Rust project and run it. [Quality assurance - maintenance] The packages do not deal with exotic hardware we cannot support [Quality assurance - testing] The packages both run a test suite on build time. However, the rustc test suite does NOT make the build fail. TODO: check with mwhudson *why*? Neither package has any autopkgtests. TODO: cargo autopkgtest that creates a new crate, adds a simple dependency (anyhow is a good candidate, no transitive deps), vendors it, builds the binary from the vendored crate, and runs it. [Quality assurance - packaging] debian/watch is present and works rustc yields quite a bit of lintian output, but they seem mostly harmless. https://lintian.debian.org/sources/rustc There are lintian overrides present, but those are usually justified in the override files themselves. cargo is a bit more tame on the warning fronts https://lintian.debian.org/sources/cargo It has an override file for the source package, for relatively minor warnings. These packages does not rely on obsolete or about to be demoted packages. The packages will not be installed by default The packaging is fairly complex, especially in the case of rustc. The crux of the complexity can be attributed to the boostrapping issue, as well as the need to deal with vendored dependencies. There is extensive documentation within the debian/ directories to help with the difficulties, and a lot of things have been automated in scripts living in debian/scripts/* Note that originally, the upstream tarball for rustc includes the sources for cargo as well as its vendored dependencies, but the Debian Rust team chose to split it out in its own package. [UI standards] I do not believe there's a need for translation for these applications given the stated purpose for having them in main. [Dependencies] The packages have quite a few vendored dependencies. However, their non-vendored dependencies are all in main, as well as the build-dependencies, assuming for the purpose of this analysis that src:rustc is in main.
[Bug 1956796] Re: FTBFS against sqlite3 3.37 or newer
Uploaded, thanks! ** Changed in: ruby-sqlite3 (Ubuntu) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1956796 Title: FTBFS against sqlite3 3.37 or newer To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ruby-sqlite3/+bug/1956796/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1956796] Re: FTBFS against sqlite3 3.37 or newer
** Changed in: ruby-sqlite3 (Ubuntu) Importance: Undecided => High ** Changed in: ruby-sqlite3 (Ubuntu) Assignee: (unassigned) => Simon Chopin (schopin) ** Changed in: ruby-sqlite3 (Ubuntu) Status: Confirmed => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1956796 Title: FTBFS against sqlite3 3.37 or newer To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ruby-sqlite3/+bug/1956796/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1956798] Re: FTBFS against sqlite3 3.37 or newer
Uploaded, thanks for the patch! ** Changed in: restfuldb (Ubuntu) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1956798 Title: FTBFS against sqlite3 3.37 or newer To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/restfuldb/+bug/1956798/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1956798] Re: FTBFS against sqlite3 3.37 or newer
** Changed in: restfuldb (Ubuntu) Assignee: (unassigned) => Simon Chopin (schopin) ** Changed in: restfuldb (Ubuntu) Status: Confirmed => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1956798 Title: FTBFS against sqlite3 3.37 or newer To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/restfuldb/+bug/1956798/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1957815] [NEW] xml-security-c: tests fail due to using RSA_get0_key on EVP-generated key
Public bug reported: This deprecated API is not usable on RSA keys that have been generated using the high-level APIs, always returning NULL instead. This makes the test suite crash. Fixing this is non-trivial as the RSA* is part of the lib ABI. ** Affects: xml-security-c (Ubuntu) Importance: Undecided Status: New ** Tags: transition-openssl3-jj update-excuse -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1957815 Title: xml-security-c: tests fail due to using RSA_get0_key on EVP-generated key To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xml-security-c/+bug/1957815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1957170] Re: libio-socket-ssl-perl depends on obsolete libssl1.1
Attached is a patch removing the hard-coded dependency. A fixed package has also been uploaded to a PPA (just pop the last changelog entry): https://launchpad.net/~schopin/+archive/ubuntu/test- ppa/+sourcepub/13196884/+listing-archive-extra ** Patch added: "libio-socket-ssl-perl.debdiff" https://bugs.launchpad.net/ubuntu/+source/libio-socket-ssl-perl/+bug/1957170/+attachment/5553554/+files/libio-socket-ssl-perl.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1957170 Title: libio-socket-ssl-perl depends on obsolete libssl1.1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libio-socket-ssl-perl/+bug/1957170/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1957170] [NEW] libio-socket-ssl-perl depends on obsolete libssl1.1
Public bug reported: The package declares an explicit dependency on libssl1.1, which we don't really want since we're transitioning to OpenSSL 3.0 ** Affects: libio-socket-ssl-perl (Ubuntu) Importance: Undecided Status: New ** Tags: transition-openssl3-jj -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1957170 Title: libio-socket-ssl-perl depends on obsolete libssl1.1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libio-socket-ssl-perl/+bug/1957170/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1957166] Re: xmltooling: FTBFS against OpenSSL 3.0
** Changed in: xmltooling (Ubuntu) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1957166 Title: xmltooling: FTBFS against OpenSSL 3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xmltooling/+bug/1957166/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1957166] [NEW] xmltooling: FTBFS against OpenSSL 3.0
Public bug reported: The package fails to build, the test run fails. The issue comes from the xmltoolingtest/data/test.pfx certificate that contains data encrypted using RC2, which is disabled by default in OpenSSL 3.0. It could be re-enabled using the legacy provider, but I'd rather upgrade the certificate to use a supported algorithm. Converting the algorithm can be done via these simple steps (using an intermediary file because piping doesn't seem to work...) openssl pkcs12 -in xmltoolingtest/data/test.pfx -passin pass:password -out cert.pem -nodes openssl pkcs12 -export -descert -out xmltoolingtest/data/test.pfx -passout pass:password -in cert.pem rm cert.pem (note that if using OpenSSL 3.0 you'll need to add `-provider default -provider legacy` to the first command in order to decode the original file) ** Affects: xmltooling (Ubuntu) Importance: High Status: New ** Tags: ftbfs transition-openssl3-jj ** Description changed: The package fails to build, the test run fails. The issue comes from the xmltoolingtest/data/test.pfx certificate that contains data encrypted using RC2, which is disabled by default in OpenSSL 3.0. It could be re-enabled using the legacy provider, but I'd rather upgrade the certificate to use a supported algorithm. Converting the algorithm can be done via these simple steps (using an intermediary file because piping doesn't seem to work...) - openssl pkcs12 -provider default -provider legacy -in xmltoolingtest/data/test.pfx -passin pass:password -out cert.pem -nodes + openssl pkcs12 -in xmltoolingtest/data/test.pfx -passin pass:password -out cert.pem -nodes openssl pkcs12 -export -out xmltoolingtest/data/test.pfx -passout pass:password -in cert.pem rm cert.pem (note that if using OpenSSL 3.0 you'll need to add `-provider default -provider legacy` to the first command in order to decode the original file) ** Description changed: The package fails to build, the test run fails. The issue comes from the xmltoolingtest/data/test.pfx certificate that contains data encrypted using RC2, which is disabled by default in OpenSSL 3.0. It could be re-enabled using the legacy provider, but I'd rather upgrade the certificate to use a supported algorithm. Converting the algorithm can be done via these simple steps (using an intermediary file because piping doesn't seem to work...) openssl pkcs12 -in xmltoolingtest/data/test.pfx -passin pass:password -out cert.pem -nodes - openssl pkcs12 -export -out xmltoolingtest/data/test.pfx -passout pass:password -in cert.pem + openssl pkcs12 -export -descert -out xmltoolingtest/data/test.pfx -passout pass:password -in cert.pem rm cert.pem (note that if using OpenSSL 3.0 you'll need to add `-provider default -provider legacy` to the first command in order to decode the original file) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1957166 Title: xmltooling: FTBFS against OpenSSL 3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xmltooling/+bug/1957166/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1957100] Re: Merge lintian 2.114.0 from Debian unstable
** Summary changed: - Merge lintian 2.114.0 from Debian uinstable + Merge lintian 2.114.0 from Debian unstable -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1957100 Title: Merge lintian 2.114.0 from Debian unstable To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1957100/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1957100] Re: Merge lintian 2.114.0 from Debian uinstable
** Patch added: "lintian_debian.debdiff" https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1957100/+attachment/5553374/+files/lintian_debian.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1957100 Title: Merge lintian 2.114.0 from Debian uinstable To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1957100/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1957100] Re: Merge lintian 2.114.0 from Debian uinstable
Attached are debdiffs against the current Ubuntu version 2.111.0ubuntu2 and the Debian version 2.114.0. You can also find a built version there: https://launchpad.net/~schopin/+archive/ubuntu/test- ppa/+sourcepub/13195421/+listing-archive-extra (just pop the PPA-related changelog entries) ** Patch added: "lintian_ubuntu.debdiff" https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1957100/+attachment/5553373/+files/lintian_ubuntu.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1957100 Title: Merge lintian 2.114.0 from Debian uinstable To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1957100/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1957100] [NEW] Merge lintian 2.114.0 from Debian uinstable
Public bug reported: Please merge the 2.114.0 version from Debian. I'm guessing it is needed by the latest lintian-brush, which currently FTBFS. ** Affects: lintian (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1957100 Title: Merge lintian 2.114.0 from Debian uinstable To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1957100/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1956753] Re: tests: Fails to generate a password-protected X509 certificate
Marking the libnet-ssleay-perl part as invalid to match upstream's opinion that it's not fixable without breaking compatibility. ** Changed in: lemonldap-ng (Ubuntu) Status: New => Fix Committed ** Changed in: libnet-ssleay-perl (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1956753 Title: tests: Fails to generate a password-protected X509 certificate To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lemonldap-ng/+bug/1956753/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1956765] Re: autopkgtests fail with openssl 3.0.1
** Patch added: "py3.10.debdiff" https://bugs.launchpad.net/ubuntu/+source/python3.10/+bug/1956765/+attachment/5552620/+files/py3.10.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1956765 Title: autopkgtests fail with openssl 3.0.1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/python3.10/+bug/1956765/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1956765] Re: autopkgtests fail with openssl 3.0.1
Attached are debdiffs for python3.9 and python3.10 that cherry-pick an upstream fix for this. Fixed versions have been also been uploaded to this PPA (just pop the ~ppa changelog entries): https://launchpad.net/~schopin/+archive/ubuntu/test-ppa/+packages ** Patch added: "py3.9.debdiff" https://bugs.launchpad.net/ubuntu/+source/python3.10/+bug/1956765/+attachment/5552619/+files/py3.9.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1956765 Title: autopkgtests fail with openssl 3.0.1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/python3.10/+bug/1956765/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1956765] [NEW] autopkgtests fail with openssl 3.0.1
Public bug reported: The autopkgtest suites of python 3.9 and 3.10 fail against openssl 3.0.1 due to a faulty version check. ** Affects: python3.10 (Ubuntu) Importance: High Status: Confirmed ** Affects: python3.9 (Ubuntu) Importance: High Status: Confirmed ** Tags: transition-openssl3-jj update-excuse ** Also affects: python3.10 (Ubuntu) Importance: Undecided Status: New ** Changed in: python3.10 (Ubuntu) Status: New => Confirmed ** Changed in: python3.10 (Ubuntu) Importance: Undecided => High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1956765 Title: autopkgtests fail with openssl 3.0.1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/python3.10/+bug/1956765/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1956753] Re: tests: Fails to generate a password-protected X509 certificate
Bug reported upstream at https://gitlab.ow2.org/lemonldap-ng/lemonldap- ng/-/issues/2682 ** Bug watch added: gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues #2682 https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2682 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1956753 Title: tests: Fails to generate a password-protected X509 certificate To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lemonldap-ng/+bug/1956753/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1956753] [NEW] tests: Fails to generate a password-protected X509 certificate
Public bug reported: The test suite for lemonldap-ng fails when checking the newCertificate REST endpoint with a given password. I'm fairly sure it is a bug in libnet-ssleay-perl. ** Affects: lemonldap-ng (Ubuntu) Importance: High Status: New ** Affects: libnet-ssleay-perl (Ubuntu) Importance: Undecided Status: New ** Tags: update-excuse ** Also affects: libnet-ssleay-perl (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1956753 Title: tests: Fails to generate a password-protected X509 certificate To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lemonldap-ng/+bug/1956753/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1951065] Re: [MIR] libio-prompt-tiny-perl
** Description changed: - TBD + [Availability] + The package libio-prompt-tiny-perl is already in Ubuntu universe. + The package libio-prompt-tiny-perl builds for the architectures it is designed to work on. + It currently builds and works for architectures: all + Link to package [[https://launchpad.net/ubuntu/+source/libio-prompt-tiny-perl|libio-prompt-tiny-perl]] + + [Rationale] + - The package libio-prompt-tiny-perl is required in Ubuntu main for lintian + - The package libio-prompt-tiny-perl will not generally be useful for a large part of + our user base, but is important/helpful still because lintian is an essential part + of the packaging toolkit + - The package libio-prompt-tiny-perl is a new runtime dependency of package that + we already support + + [Security] + - No CVEs/security issues in this software in the past + + - no `suid` or `sgid` binaries + - no executables in `/sbin` and `/usr/sbin` + - Package does not install services, timers or recurring jobs + - Packages does not open privileged ports (ports < 1024) + - Packages does not contain extensions to security-sensitive software + (filters, scanners, plugins, UI skins, ...) + + [Quality assurance - function/usage] + - The package works well right after install + + [Quality assurance - maintenance] + - The package is well maintained in Debian/Ubuntu, as part of the Debian Perl team. It does not have *any* bug open, either in Debian nor in Ubuntu. Upstream is fairly inactive, with last release in 2015 + - Ubuntu https://bugs.launchpad.net/ubuntu/+source/libio-prompt-tiny-perl/+bug + - Debian https://bugs.debian.org/cgi-bin/pkgreport.cgi?src=libio-prompt-tiny-perl + - The package does not deal with exotic hardware we cannot support + + [Quality assurance - testing] + - The package runs a test suite on build time, if it fails + it makes the build fail, link to build log https://launchpadlibrarian.net/536120852/buildlog_ubuntu-impish-amd64.libio-interactive-perl_1.023-1_BUILDING.txt.gz + It should be noted that since by essence the code deals with interactive terminals, a fair share of the tests are skipped during the builds. + + - The package runs the autodep8-perl autopkgtests, which includes running the + unit test suite, and is currently passing on all architectures: + https://autopkgtest.ubuntu.com/packages/libi/libio-prompt-tiny-perl + + [Quality assurance - packaging] + - debian/watch is present and works + - This package does not yield massive lintian Warnings, Errors, except for outdated standards + and Vcs-* fields (fixed in Salsa but not uploaded) + - Link to the Debian lintian report: https://lintian.debian.org/sources/libio-prompt-tiny-perl + - Lintian overrides are not present + - This package does not rely on obsolete or about to be demoted packages. + - The package will not be installed by default + - Packaging and build is easy, link to d/rules https://sources.debian.org/src/libio-prompt-tiny-perl/0.003-1/debian/rules/ + + [Dependencies] + - No further depends or recommends dependencies that are not yet in main + + [Standards compliance] + - This package correctly follows FHS and Debian Policy + + [Maintenance/Owner] + - Owning Team will be Foundations + - Team is not yet, but will subscribe to the package before promotion + - This does not use static builds + - This does not use vendored code + + [Background information] + The Package description explains the package well! + Upstream Name is David Golden + Upstream project: https://github.com/dagolden/IO-Prompt-Tiny ** Changed in: libio-prompt-tiny-perl (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1951065 Title: [MIR] libio-prompt-tiny-perl To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libio-prompt-tiny-perl/+bug/1951065/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1945811] Re: libnet-ssleay-perl: Fail to build against OpenSSL 3.0
** Changed in: libnet-ssleay-perl (Ubuntu) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1945811 Title: libnet-ssleay-perl: Fail to build against OpenSSL 3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libnet-ssleay-perl/+bug/1945811/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1945958] Re: neon27: Fail to build against OpenSSL 3.0
Fixed via Debian sync of version 0.32.1 ** Changed in: neon27 (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1945958 Title: neon27: Fail to build against OpenSSL 3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/neon27/+bug/1945958/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1945998] Re: pam-p11: Fail to build against OpenSSL 3.0
This has been fixed independently by Steve in 0.3.1-1ubuntu1 ** Changed in: pam-p11 (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1945998 Title: pam-p11: Fail to build against OpenSSL 3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pam-p11/+bug/1945998/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1946014] Re: ovn: Fail to build against OpenSSL 3.0
Marking as Confirmed as the FTBFS has actually hit the version currently in the archive. ** Changed in: ovn (Ubuntu) Status: Expired => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1946014 Title: ovn: Fail to build against OpenSSL 3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ovn/+bug/1946014/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1931369] Re: various lintian-brush Autopkgtest fails in Impish
The dh_assistant issue should be fixed in the upcoming 0.115. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1931369 Title: various lintian-brush Autopkgtest fails in Impish To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/debmutate/+bug/1931369/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1955026] Re: Upgrade openssl to 3.0.1 on Jammy
Attached is a debdiff for this upgrade. Alternatively, a packaged version has been uploaded to the following PPA, just pop the last changelog entry to get the proper uploadable version: https://launchpad.net/~schopin/+archive/ubuntu/test- ppa/+sourcepub/13051752/+listing-archive-extra ** Patch added: "openssl.debdiff" https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1955026/+attachment/5547978/+files/openssl.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1955026 Title: Upgrade openssl to 3.0.1 on Jammy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1955026/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1955026] [NEW] Upgrade openssl to 3.0.1 on Jammy
*** This bug is a security vulnerability *** Public security bug reported: Upstream has released a new version 3.0.1, including a security fix. https://mta.openssl.org/pipermail/openssl-announce/2021-December/000212.html https://mta.openssl.org/pipermail/openssl-announce/2021-December/000213.html ** Affects: openssl (Ubuntu) Importance: High Status: New ** Tags: transition-openssl3-jj -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1955026 Title: Upgrade openssl to 3.0.1 on Jammy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1955026/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1953301] Re: Segfault on AArch64 caused by OpenSSL affecting numerous packages
Sounds suspiciously similar to https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1951279 but I'd like confirmation that the situation described in the meson issue comment (TLS 1.2 with ECDHE-RSA-CHACHA20-POLY1305) also applies there before marking as duplicate. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953301 Title: Segfault on AArch64 caused by OpenSSL affecting numerous packages To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1953301/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1953301] Re: Segfault on AArch64 caused by OpenSSL affecting numerous packages
** Tags added: rls-ff-incoming -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953301 Title: Segfault on AArch64 caused by OpenSSL affecting numerous packages To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1953301/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1953487] Re: FTBFS against OpenSSL3.0
** Changed in: pgbouncer (Ubuntu) Status: New => Fix Committed ** Changed in: pgbouncer (Ubuntu) Importance: Undecided => High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953487 Title: FTBFS against OpenSSL3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pgbouncer/+bug/1953487/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1953487] [NEW] FTBFS against OpenSSL3.0
Public bug reported: This package fails to build against OpenSSL 3.0, due to an underlying segfault. This has been reported upstream at https://github.com/libusual/libusual/issues/35 (embedded within the pgbouncer source), this issue is for tracing purposes. ** Affects: pgbouncer (Ubuntu) Importance: Undecided Status: New ** Tags: transition-openssl3-jj -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953487 Title: FTBFS against OpenSSL3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pgbouncer/+bug/1953487/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1953128] Re: GCC ICE: in create_fix_barrier, at config/arm/arm.c:17891
Oh yes sorry, I should have notified the bug manually. Thanks for forwarding it to Debian! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953128 Title: GCC ICE: in create_fix_barrier, at config/arm/arm.c:17891 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gcc-11/+bug/1953128/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1946007] Re: pkcs11-helper: Fail to build against OpenSSL 3.0
** Changed in: pkcs11-helper (Ubuntu) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1946007 Title: pkcs11-helper: Fail to build against OpenSSL 3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pkcs11-helper/+bug/1946007/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1953128] Re: GCC ICE: in create_fix_barrier, at config/arm/arm.c:17891
Workaround for the failure in postgresql-14 ** Patch added: "postgresql-14.debdiff" https://bugs.launchpad.net/ubuntu/+source/gcc-11/+bug/1953128/+attachment/5545119/+files/postgresql-14.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953128 Title: GCC ICE: in create_fix_barrier, at config/arm/arm.c:17891 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gcc-11/+bug/1953128/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1953128] [NEW] GCC ICE: in create_fix_barrier, at config/arm/arm.c:17891
Public bug reported: This ICE was hit when building Postgresql-14 on GCC 11.2 on armhf A similar issue has been found in Fedora when building qemu: https://lists.fedoraproject.org/archives/list/de...@lists.fedoraproject.org/thread/GD3ABSWD6HHTNEKV2EJY4PXABQ245UCZ/ The issue is tracked upstream at https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103395 ** Affects: gcc-11 (Ubuntu) Importance: Undecided Status: New ** Affects: postgresql-14 (Ubuntu) Importance: Undecided Status: New ** Also affects: gcc-11 (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953128 Title: GCC ICE: in create_fix_barrier, at config/arm/arm.c:17891 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gcc-11/+bug/1953128/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1953023] Re: Fail to detect key length with OpenSSL 3
This patch solves the issue. Its autopkgtests have been run both against OpenSSL 1.1 and 3.0, and it has been forwarded to Debian at https://salsa.debian.org/apache-team/ssl-cert/-/merge_requests/3 ** Patch added: "ssl-cert.debdiff" https://bugs.launchpad.net/ubuntu/+source/ssl-cert/+bug/1953023/+attachment/5544912/+files/ssl-cert.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953023 Title: Fail to detect key length with OpenSSL 3 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ssl-cert/+bug/1953023/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1953023] [NEW] Fail to detect key length with OpenSSL 3
Public bug reported: As seen in the autopkgtest, make-ssl-cert output a warning "WARNING: Cannot determine RSA key length" which breaks the tests. ** Affects: ssl-cert (Ubuntu) Importance: High Status: Confirmed ** Tags: transition-openssl3-jj update-excuse -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953023 Title: Fail to detect key length with OpenSSL 3 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ssl-cert/+bug/1953023/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1952935] [NEW] RM for FTBFS blocking the OpenSSL3 transition
Public bug reported: Hi, The libneo4j-client package FTBFS in Impish and Jammy: https://people.canonical.com/~ginggs/ftbfs-report/test-rebuild-20210927-impish-impish.html https://launchpad.net/ubuntu/+source/libneo4j-client/2.2.0-1.1build1 The issue is non-trivial to fix (casting between complex C structs/unions with similar memory layouts), and the package is involved in the OpenSSL transition. I couldn't find any reverse-dependency: ❯ reverse-depends src:libneo4j-client No reverse dependencies found ❯ reverse-depends -b src:libneo4j-client No reverse dependencies found Thanks in advance! Simon ** Affects: libneo4j-client (Ubuntu) Importance: Undecided Status: New ** Tags: transition-openssl3-jj -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1952935 Title: RM for FTBFS blocking the OpenSSL3 transition To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libneo4j-client/+bug/1952935/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1945795] Re: krb5: Fail to build against OpenSSL 3.0
When I upload to my test PPA I always add a new entry "PPA upload" to make sure that the whole entry is scrapped, including the ~ppa version suffix. The actual entry is the one before that. My usual sponsored uploads are based on debdiffs rather than direct PPA versions so this has never be an issue. For future reference, what would be a better way than this? The debdiff seemed too messy to be useful... -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1945795 Title: krb5: Fail to build against OpenSSL 3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1945795/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1952775] [NEW] RM from Jammy for lack of OpenSSL 3 support
Public bug reported: Hi, Please remove libdigidoc from Jammy, as it fails to build against OpenSSL 3.0, which hinders the transition. https://launchpad.net/ubuntu/+source/libdigidoc/3.10.5-2build1 Fixing the failure is non-trivial, and without upstream involvement (see below) I'd much rather have this package out of the archive rather than shipped with buggy patches, especially given its purpose of government ID management. This library has no reverse-dependencies in the archive: ❯ reverse-depends src:libdigidoc No reverse dependencies found ❯ reverse-depends -b src:libdigidoc No reverse dependencies found Furthermore, it appears to be dead upstream, as the authors list it as EOL since 2015 https://www.id.ee/en/rubriik/digidoc-libraries/ (cdigidoc) and have archive the Github repo: https://github.com/open-eid/libdigidoc Thanks in advance ** Affects: libdigidoc (Ubuntu) Importance: Undecided Status: New ** Tags: transition-openssl3-jj -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1952775 Title: RM from Jammy for lack of OpenSSL 3 support To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libdigidoc/+bug/1952775/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1952741] Re: Please RM for lack of OpenSSL 3 support
** Tags added: transition-openssl3-jj -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1952741 Title: Please RM for lack of OpenSSL 3 support To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cfengine3/+bug/1952741/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1952744] [NEW] Please remove from Jammy
Public bug reported: Hi, Please remove gatling from the Jammy archive, as the package FTBFS since Impish, which blocks the OpenSSL 3 transition: https://people.canonical.com/~ginggs/ftbfs-report/test-rebuild-20210927-impish-impish.html https://launchpad.net/ubuntu/+source/gatling/0.13-6.1build1 This is a leaf package without reverse-dependencies that I could find: ❯ reverse-depends src:gatling No reverse dependencies found ❯ reverse-depends -b src:gatling No reverse dependencies found I was unable to find any public bug tracker or development mailing-list for gatling. The Debian package lags behind upstream significantly (0.13 was released in 2012, current upstream is 0.16 release in 2020). Thanks in advance! ** Affects: gatling (Ubuntu) Importance: Undecided Status: New ** Tags: transition-openssl3-jj ** Tags added: transition-openssl3-jj -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1952744 Title: Please remove from Jammy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gatling/+bug/1952744/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1952741] [NEW] Please RM for lack of OpenSSL 3 support
Public bug reported: Hi, Please remove cfengine3 from Jammy, as it fails to build against OpenSSL 3.0 with no trivial fix available, see https://launchpad.net/ubuntu/+source/cfengine3/3.15.2-3build1 Upstream is aware of the issue but hasn't succeeded in coming up with a fix of their own so far: https://tracker.mender.io/browse/CFE-3798 https://github.com/cfengine/libntech/pull/155 The issue has been reported in Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990369 The package has no reverse-dependencies that I could find: ❯ reverse-depends src:cfengine3 No reverse dependencies found ❯ reverse-depends -b src:cfengine3 No reverse dependencies found Thanks in advance! ** Affects: cfengine3 (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1952741 Title: Please RM for lack of OpenSSL 3 support To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cfengine3/+bug/1952741/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1945812] Re: librabbitmq: Fail to build against OpenSSL 3.0
Just retried the patch in a new build against -proposed, it worked fine. I'm guessing the previous failure was due to a dependency that wasn't compatible with OpenSSL 3 at the time, or just that -proposed was broken at the time? In any case, I've refreshed the version in https://launchpad.net/~schopin/+archive/ubuntu/test-ppa/+packages which has now picked up the OpenSSL 3 present in -proposed, and am officially looking for a sponsor :) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1945812 Title: librabbitmq: Fail to build against OpenSSL 3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/librabbitmq/+bug/1945812/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1946193] Re: sbsigntool: Fail to build against OpenSSL 3.0
With the proper diff. ** Patch added: "sbsigntool.debdiff" https://bugs.launchpad.net/ubuntu/+source/sbsigntool/+bug/1946193/+attachment/5544119/+files/sbsigntool.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1946193 Title: sbsigntool: Fail to build against OpenSSL 3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/sbsigntool/+bug/1946193/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1945795] Re: krb5: Fail to build against OpenSSL 3.0
I've uploaded a package to https://launchpad.net/~schopin/+archive/ubuntu/test-ppa/+packages based on the above MR. autopkgtests against -proposed ran fine on amd64. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1945795 Title: krb5: Fail to build against OpenSSL 3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1945795/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1952237] Re: FTBFS in jammy
** Patch added: "cryptsetup.debdiff" https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/1952237/+attachment/5543339/+files/cryptsetup.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1952237 Title: FTBFS in jammy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/1952237/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1952237] [NEW] FTBFS in jammy
Public bug reported: THe build depends on libsepol1-dev, which has been replaced by libsepol- dev in jammy. ** Affects: cryptsetup (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1952237 Title: FTBFS in jammy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/1952237/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1945764] Re: crda: Fail to build against OpenSSL 3.0
Refresh of the debdiff against the latest version ** Patch added: "crda.debdiff" https://bugs.launchpad.net/ubuntu/+source/crda/+bug/1945764/+attachment/5543314/+files/crda.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1945764 Title: crda: Fail to build against OpenSSL 3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/crda/+bug/1945764/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1945768] Re: erlang: Fail to build against OpenSSL 3.0
Refreshed the patch against the newer version. ** Patch added: "erlang.debdiff" https://bugs.launchpad.net/ubuntu/+source/erlang/+bug/1945768/+attachment/5543290/+files/erlang.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1945768 Title: erlang: Fail to build against OpenSSL 3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/erlang/+bug/1945768/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1951993] Re: libnet-ssleay-perl FTBFS
See bug #1952208 for a simple resolution of the issue. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1951993 Title: libnet-ssleay-perl FTBFS To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/aptdaemon/+bug/1951993/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1952208] [NEW] Sync libnet-ssleay-perl 1.91.01-1 (main) from Debian experimental (main)
Public bug reported: Please sync libnet-ssleay-perl 1.91.01-1 (main) from Debian experimental (main) Hi! I'd like to sync the Debian experimental version of libnet-ssleay-perl. This is a "development release" that's explicitly a precursor to a stable release "soon", as indicated there: https://github.com/radiator-software/p5-net-ssleay/issues/326 The repository hasn't seen much activity relevant to our use-case since the release, either in commits or issues opened. Explanation of the Ubuntu delta and why it can be dropped: * No-change rebuild to build packages with zstd compression. -> Self explanatory * Merge from Debian, remaining changes: - Patch t/local/44_sess.t to set security level 1 when testing TLSv1 & TLSv1.1. The default security level 2 prohibits TLS versions below TLSv1.2. - Fakesync, due to tarball missmatch. -> The tests have been changed in the upstream version to only run on protocol versions supported by the underlying libssl, and 44_sess now explicitly sets the security level for the older protocols when running with OpenSSL 3.0 Changelog entries since current jammy version 1.88-3ubuntu2: libnet-ssleay-perl (1.91.01-1) experimental; urgency=medium * Import upstream development release 1.91_01. Adds OpenSSL3 support (LP: #1945811) * Update build dependencies. * Refresh 20no-stray-libz-link.patch (offset). * Upload to experimental. -- gregor herrmann Sat, 13 Nov 2021 18:08:00 +0100 libnet-ssleay-perl (1.90-1) unstable; urgency=medium [ gregor herrmann ] * Replace '--with perl_openssl' in debian/rules with a build dependency on 'dh-sequence-perl-openssl'. * Update 'DEB_BUILD_MAINT_OPTIONS = hardening=+bindnow' to '=+all'. [ Debian Janitor ] * Apply multi-arch hints. + libnet-ssleay-perl: Add Multi-Arch: same. * Bump debhelper from old 12 to 13. * Update standards version to 4.5.1, no changes needed. [ gregor herrmann ] * Import upstream version 1.90. * Update debian/upstream/metadata. * Update years of packaging copyright. * Update upstream copyright holders and contact. [ Simon Chopin ] * Refresh d/p/20no-stray-libz-link.patch * Drop openssl-1.1.1e.patch, merged upstream [ gregor herrmann ] * Install upstream CONTRIBUTING document. * Declare compliance with Debian Policy 4.6.0. * Add debian/tests/pkg-perl/smoke-files. New helper modules for the tests are in inc/. -- gregor herrmann Sat, 13 Nov 2021 17:38:08 +0100 ** Affects: libnet-ssleay-perl (Ubuntu) Importance: Wishlist Status: New ** Changed in: libnet-ssleay-perl (Ubuntu) Importance: Undecided => Wishlist -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1952208 Title: Sync libnet-ssleay-perl 1.91.01-1 (main) from Debian experimental (main) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libnet-ssleay-perl/+bug/1952208/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1952144] Re: Update for openssl v3
** Tags added: transition-openssl3-jj -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1952144 Title: Update for openssl v3 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/golang-github-mendersoftware-openssl/+bug/1952144/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1952081] [NEW] Bootstrap picolisp on s390x
Public bug reported: The package currently cannot be built on s390x because it needs manual bootstrapping, as it depends on itself for build. Here are some briefs hints on how to achieve this: Anyone here has any experience bootstrapping a language in a "new" architecture? picolisp FTBFS on s390x because it needs itself, and I'm idly wondering how to solve the problem schopin: use debian's build to build ubuntu package; vendor it in a source package; upload to bileto ppa; rebuild again afresh; publish to ubuntu archive; rebuild in ubuntu archive proper again. schopin: alternative is to cross-build the first one. schopin: sometimes, debian/* has instructions for bootstrapping. as the first upload of the thing had to be bootstrapped by the person ** Affects: picolisp (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1952081 Title: Bootstrap picolisp on s390x To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/picolisp/+bug/1952081/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 1945956] Re: mysql-8.0: Fail to build against OpenSSL 3.0
Oh I'd rather not take over, thank you :-D I just wanted to do a quick sanity check of this patch since mysql-8 was the last package on my list that didn't have any obvious sign of activity. I'm glad you're on it :) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1945956 Title: mysql-8.0: Fail to build against OpenSSL 3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mysql-8.0/+bug/1945956/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1945956] Re: mysql-8.0: Fail to build against OpenSSL 3.0
OK, so I tested out the patches linked above. Turns out they still FTBFS against libssl3, because there is some SSL code buried in some plugins which hasn't been update. ALso, the patched package also FTBFS against libssl1.1 as the test suite fails on main.ssl_deprecated_tls_versions. I'm currently rebuilding the package from scratch to check that it is indeed a regression from the patch, and not something that's been introduced by the 1.1.1l version of OpenSSL. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1945956 Title: mysql-8.0: Fail to build against OpenSSL 3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mysql-8.0/+bug/1945956/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1943109] Re: Merge 1.1.1l-1 version from Debian
** Changed in: openssl (Ubuntu) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1943109 Title: Merge 1.1.1l-1 version from Debian To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1943109/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1946217] Re: unbound: Fail to build against OpenSSL 3.0
To be clear: the tests also fail when built against libssl1.1 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1946217 Title: unbound: Fail to build against OpenSSL 3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/unbound/+bug/1946217/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1946217] Re: unbound: Fail to build against OpenSSL 3.0
I can confirm that the version 1.13.2 fixes the issue, as I've uploaded an updated package to schopin/foundation-openssl3 which builds with success. However, the autopkgtests fail because of the python 3.10 transition (couldn't find the _unbound module for 3.10) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1946217 Title: unbound: Fail to build against OpenSSL 3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/unbound/+bug/1946217/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1951624] [NEW] OpenSSL 3.0 transition might lead to unsupported protocols
Public bug reported: OpenSSL 3.0, which is planned to land in the archive Very Soon™, has moved quite a few algorithms to its "legacy" provider, which isn't loaded by default. Some of those algorithms are used in various protocols implemented by wpa_supplicant, so it's likely that the package will be broken in this regard. Sadly, this isn't caught by either the build-time tests nor the autopkgtests. A first good step would be to patch wpa_supplicant to load the "legacy" provider (and the default one too, cf https://www.openssl.org/docs/manmaster/man7/crypto.html , look for "legacy"). ** Affects: wpa (Ubuntu) Importance: Undecided Status: New ** Tags: fr-1881 transition-openssl3-jj ** Tags added: fr-1881 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1951624 Title: OpenSSL 3.0 transition might lead to unsupported protocols To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1951624/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1946205] Re: squid: Fail to build against OpenSSL 3.0
Patch based on the PR linked above, uploaded to both https://launchpad.net/~schopin/+archive/ubuntu/test-ppa/ (libssl1.1) and https://launchpad.net/~schopin/+archive/ubuntu/foundation-openssl3/ (libssl3) The autopkgtests fail currently because of https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1951476 ** Patch added: "squid.debdiff" https://bugs.launchpad.net/ubuntu/+source/squid/+bug/1946205/+attachment/5542138/+files/squid.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1946205 Title: squid: Fail to build against OpenSSL 3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/squid/+bug/1946205/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1945980] Re: openvpn: Fail to build against OpenSSL 3.0
easy-rsa fix uploaded ( https://bugs.launchpad.net/ubuntu/+source/easy- rsa/+bug/1951581 ) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1945980 Title: openvpn: Fail to build against OpenSSL 3.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openvpn/+bug/1945980/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs