** Changed in: openafs (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/bugs/1914279
Title:
linux from security may force
All work for this report has been completed, I believe the linux and
linux-meta tasks can be closed out as well.
** Changed in: linux (Ubuntu)
Status: Triaged => Fix Released
** Changed in: linux-meta (Ubuntu)
Status: Triaged => Fix Released
--
You received this bug notification
This bug was fixed in the package zfs-linux - 0.8.3-1ubuntu12.9
---
zfs-linux (0.8.3-1ubuntu12.9) focal; urgency=medium
* No change rebuild in security pocket. LP: #1914279.
-- Dimitri John Ledkov Thu, 29 Apr 2021 16:09:45
+0100
--
You received this bug notification because
This bug was fixed in the package virtualbox -
6.1.16-dfsg-6~ubuntu1.20.04.2
---
virtualbox (6.1.16-dfsg-6~ubuntu1.20.04.2) focal; urgency=medium
* No change rebuild in security pocket. LP: #1914279.
-- Dimitri John Ledkov Thu, 29 Apr 2021 16:42:15
+0100
** Changed in:
This bug was fixed in the package r8168 - 8.048.00-1ubuntu0.20.04.2
---
r8168 (8.048.00-1ubuntu0.20.04.2) focal; urgency=medium
* No change rebuild in security pocket. LP: #1914279.
-- Dimitri John Ledkov Thu, 29 Apr 2021 16:08:42
+0100
** Changed in: rtl8812au (Ubuntu Focal)
This bug was fixed in the package v4l2loopback - 0.12.3-1ubuntu0.4
---
v4l2loopback (0.12.3-1ubuntu0.4) focal; urgency=medium
* No change rebuild in security pocket. LP: #1914279.
-- Dimitri John Ledkov Thu, 29 Apr 2021 16:09:12
+0100
** Changed in: virtualbox (Ubuntu Focal)
This bug was fixed in the package lttng-modules -
2.12.2-1ubuntu1~20.04.2
---
lttng-modules (2.12.2-1ubuntu1~20.04.2) focal; urgency=medium
* No change rebuild in security pocket. LP: #1914279.
-- Dimitri John Ledkov Thu, 29 Apr 2021 16:08:09
+0100
** Changed in:
This bug was fixed in the package virtualbox-hwe - 6.1.16-dfsg-
6ubuntu1.20.04.2
---
virtualbox-hwe (6.1.16-dfsg-6ubuntu1.20.04.2) focal; urgency=medium
* No change rebuild in security pocket. LP: #1914279.
-- Dimitri John Ledkov Thu, 29 Apr 2021 16:06:25
+0100
** Changed in:
This bug was fixed in the package iptables-netflow - 2.4-2ubuntu0.4
---
iptables-netflow (2.4-2ubuntu0.4) focal; urgency=medium
* No change rebuild in security pocket. LP: #1914279.
-- Dimitri John Ledkov Thu, 29 Apr 2021 16:07:51
+0100
** Changed in: liblzf (Ubuntu Focal)
This bug was fixed in the package rtl8812au - 4.3.8.12175.20140902+dfsg-
0ubuntu13~20.04.2
---
rtl8812au (4.3.8.12175.20140902+dfsg-0ubuntu13~20.04.2) focal; urgency=medium
* No change rebuild in security pocket. LP: #1914279.
-- Dimitri John Ledkov Thu, 29 Apr 2021 16:08:52
This bug was fixed in the package sysdig - 0.26.4-1ubuntu0.3
---
sysdig (0.26.4-1ubuntu0.3) focal; urgency=medium
* No change rebuild in security pocket. LP: #1914279.
-- Dimitri John Ledkov Thu, 29 Apr 2021 16:09:03
+0100
** Changed in: v4l2loopback (Ubuntu Focal)
This bug was fixed in the package bcmwl - 6.30.223.271+bdcom-
0ubuntu7~20.04.2
---
bcmwl (6.30.223.271+bdcom-0ubuntu7~20.04.2) focal; urgency=medium
* No change rebuild in security pocket. LP: #1914279.
-- Dimitri John Ledkov Thu, 29 Apr 2021 16:05:27
+0100
** Changed in:
This bug was fixed in the package oss4 - 4.2-build2010-5ubuntu6~20.04.2
---
oss4 (4.2-build2010-5ubuntu6~20.04.2) focal; urgency=medium
* No change rebuild in security pocket. LP: #1914279.
-- Dimitri John Ledkov Thu, 29 Apr 2021 16:08:32
+0100
** Changed in: r8168 (Ubuntu
This bug was fixed in the package nvidia-graphics-drivers-340 -
340.108-0ubuntu5.20.04.2
---
nvidia-graphics-drivers-340 (340.108-0ubuntu5.20.04.2) focal; urgency=medium
* No change rebuild in security pocket. LP: #1914279.
-- Dimitri John Ledkov Thu, 29 Apr 2021 16:05:47
+0100
This bug was fixed in the package liblzf - 3.6-2~ubuntu1.20.04.2
---
liblzf (3.6-2~ubuntu1.20.04.2) focal; urgency=medium
* No change rebuild in security pocket. LP: #1914279.
-- Dimitri John Ledkov Thu, 29 Apr 2021 17:11:50
+0100
** Changed in: lime-forensics (Ubuntu Focal)
This bug was fixed in the package evdi - 1.7.0+dfsg-1ubuntu1~20.04.3
---
evdi (1.7.0+dfsg-1ubuntu1~20.04.3) focal; urgency=medium
* No change rebuild in security pocket. LP: #1914279.
-- Dimitri John Ledkov Thu, 29 Apr 2021 16:07:32
+0100
** Changed in: gost-crypto (Ubuntu
This bug was fixed in the package dm-writeboost - 2.2.9-1ubuntu1.2
---
dm-writeboost (2.2.9-1ubuntu1.2) focal; urgency=medium
* No change rebuild in security pocket. LP: #1914279.
-- Dimitri John Ledkov Thu, 29 Apr 2021 16:07:23
+0100
** Changed in: evdi (Ubuntu Focal)
This bug was fixed in the package lime-forensics - 1.9-1ubuntu0.2
---
lime-forensics (1.9-1ubuntu0.2) focal; urgency=medium
* No change rebuild in security pocket. LP: #1914279.
-- Dimitri John Ledkov Thu, 29 Apr 2021 16:08:00
+0100
** Changed in: lttng-modules (Ubuntu Focal)
This bug was fixed in the package gost-crypto - 0.3.2-2ubuntu0.2
---
gost-crypto (0.3.2-2ubuntu0.2) focal; urgency=medium
* No change rebuild in security pocket. LP: #1914279.
-- Dimitri John Ledkov Thu, 29 Apr 2021 16:07:41
+0100
** Changed in: iptables-netflow (Ubuntu Focal)
This bug was fixed in the package dahdi-linux - 1:2.11.1~dfsg-1ubuntu6.2
---
dahdi-linux (1:2.11.1~dfsg-1ubuntu6.2) focal; urgency=medium
* No change rebuild in security pocket. LP: #1914279.
-- Dimitri John Ledkov Thu, 29 Apr 2021 16:07:14
+0100
** Changed in: dm-writeboost
This bug was fixed in the package backport-iwlwifi-dkms -
8324-0ubuntu3~20.04.3
---
backport-iwlwifi-dkms (8324-0ubuntu3~20.04.3) focal; urgency=medium
* No change rebuild in security pocket. LP: #1914279.
-- Dimitri John Ledkov Thu, 29 Apr 2021 16:07:04
+0100
** Changed in:
This bug was fixed in the package acpi-call - 1.1.0-5ubuntu0.2
---
acpi-call (1.1.0-5ubuntu0.2) focal; urgency=medium
* No change rebuild in security pocket. LP: #1914279.
-- Dimitri John Ledkov Thu, 29 Apr 2021 16:06:55
+0100
** Changed in: acpi-call (Ubuntu Focal)
** Tags removed: verification-needed verification-needed-focal
** Tags added: verification-done verification-done-focal
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
Thank you for your information/times../
EH
On Fri, May 14, 2021, 8:25 AM Dimitri John Ledkov <
1914...@bugs.launchpad.net> wrote:
> sru-release comments:
>
> virtualbox-hwe/6.1.16-dfsg-6ubuntu1.20.04.2 (s390x, ppc64el, armhf,
> arm64) -> autopkgtest failures are a false negative. It only is
sru-release comments:
virtualbox-hwe/6.1.16-dfsg-6ubuntu1.20.04.2 (s390x, ppc64el, armhf,
arm64) -> autopkgtest failures are a false negative. It only is built
and supported on amd64
sysdig/riscv64 - ftbfs is not a regression, never built on riscv64 in
focal
zfs-linux/riscv64 - ftbfs is not a
virtualbox-hwe/6.1.16-dfsg-6ubuntu1.20.04.2 (s390x, ppc64el, armhf,
arm64) -> is a false negative. virtualbox-hwe is only supported on amd64
i thought.
https://autopkgtest.ubuntu.com/packages/v/virtualbox
https://autopkgtest.ubuntu.com/packages/v/virtualbox-hwe
Suggests that to be the case.
--
Hello Dimitri, or anyone else affected,
Accepted acpi-call into focal-proposed. The package will build now and
be available at https://launchpad.net/ubuntu/+source/acpi-
call/1.1.0-5ubuntu0.2 in a few hours, and then in the -proposed
repository.
Please help us by testing this new package. See
** Also affects: acpi-call (Ubuntu)
Importance: Undecided
Status: New
** Also affects: backport-iwlwifi-dkms (Ubuntu)
Importance: Undecided
Status: New
** Also affects: bcmwl (Ubuntu)
Importance: Undecided
Status: New
** Also affects: dahdi-linux (Ubuntu)
debdiffs are on https://bileto.ubuntu.com/#/ticket/4543
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1914279
Title:
linux from security may force reboots without complete
I've rebuilt all the packages mentioned above in bileto ppa against
security pocket and pushed them to focal-proposed queue, ready for sru
review and accept.
All, but openafs which ftbfs now, and will need to be fixed up for v5.11
anyway. So it will be rebuild in security pocket with v5.11 fixes
To minimise effort reviewing all of those packages for -security safety,
we should simply rebuild all of them in the kernel security team PPA and
publish them all to -updates/-security.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
I think I agree with @sbeattie, that the rule should be to always
promote dkms package changes which correct for build issues in the
kernel to -security on the presumption that the kernel will soon need it
as it moves to -security.
--
You received this bug notification because you are a member
Hi Dimitri,
These are the dkms packages which had the build failure fixed after the
-hwe switch in Focal from 5.4 to 5.8:
bcmwl=6.30.223.271+bdcom-0ubuntu7~20.04.1
nvidia-graphics-drivers-340=340.108-0ubuntu5.20.04.1
virtualbox-hwe=6.1.16-dfsg-6ubuntu1.20.04.1
And this is the list of all the
The issue with the dkms package has been fixed via bug 1915051.
** Changed in: dkms (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
@kernel team
please check which dkms packages in -updates fix FTBFS, and if they need
to be rebuilt in -security pocket and released in -security pocket.
** Changed in: linux-meta (Ubuntu)
Status: New => Triaged
** Changed in: linux (Ubuntu)
Status: Confirmed => Triaged
--
You
Hi Dimitri, I don't know that all dkms SRUs need to go to the security
pockets, but ones that fix build issues surely do, given the problems
that a dkms build failure causes in package installs.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which
adding breaks on linux-meta in -security, on dkms package versions that
are in -updates only, would result in the kernel being held back and not
get autoinstalled.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in
@seth-arnold @mdeslaur
Mostly the dkms packages ship source code only, without strict binary
deps on packages/libraries from updates. It should be safe to publish
them into -security pocket.
It is correct that there were a few bugs with dkms modules, which are
now resolved in -updates. But one
The false positives on kernel ADT matrix were caused by an issue in
dkms-autopkgtest shipped by the dkms package, as we discussed here:
https://lists.ubuntu.com/archives/kernel-team/2021-February/116985.html
All the dkms packages which were failing to build in Focal with the
hwe-5.8 kernel are
This is only a linux package update process problem, and apt frontends
can do nothing to prevent it.
** Changed in: unattended-upgrades (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to
The linux packgages need to add breaks against in-archive dkms modules
failing to build with the updated kernel, thus APT and APT frontends can
hold back the upgrade until all dkms package updates become ready.
** Changed in: update-manager (Ubuntu)
Status: New => Invalid
** Changed in:
Since this breaks systems unattended I'm marking the bug as High, but I
recommend the Critical severity.
** Changed in: linux (Ubuntu)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu)
Importance: Medium => High
--
You received this bug notification because you are a member
Re test rebuilds, that's certainly the intention, but there are
occasional problems:
https://launchpad.net/bugs/1910555
https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340/+bug/1910709
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1910503 (virtualbox,
probably not in
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1914279
Title:
linux from security may force reboots
I agree this sounds like an undesirable scenario. I think all dkms
packages should get built in -security as part of the SRU process to
prevent this sort of thing from happening in the future.
Do we do test rebuilds of all the dkms modules before switching the
kernel meta package to a new
45 matches
Mail list logo