** Description changed:
[Impact]
* OpenSSL 1.1.1 is an LTS release upstream, which will continue to
receive security support for much longer than 1.1.0 series will.
* OpenSSL 1.1.1 comes with support for TLS v1.3 which is expected to be
rapidly adopted due to increased set of sup
@mruffalo
This is about distribution provided packages only, installed system-wide. Not
about binaries side installed from wheels from third-party providers. Can you
test using
$ sudo apt install python3-psycopg2
Without any wheels installed from pypi...
--
You received this bug notificati
I wonder if we should change the packaging of tzdata to always build the
stuff that icu needs/wants. Such that an update of tzdata ripples
through to icu as well. Somehow.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to evolut
Public bug reported:
$ python -c 'import ssl; print(ssl.OP_NO_TLSv1_3)'
Prints 0, for python2.7 built against 1.1.0 headers, yet prints
536870912 when built against 1.1.1 irrespective of the runtime libssl1.1
library version.
This may yield confusion, especially since ssl.OPENSSL_VERSION reports
Can I have like vt1-7, on per-HMC/zvm/user basis, exported and wired up
via HMC/c3270/qemu-serial? =)
** No longer affects: ncurses (Ubuntu)
** No longer affects: qemu (Ubuntu)
** Changed in: linux (Ubuntu)
Status: Incomplete => Won't Fix
** Changed in: ubuntu-z-systems
Status
I'm confused reading this bug report. As the comments repeatedly mention
identical version numbers, stating that both the issue is present and
not present, requesting to pick up the version that is already in
xenial, and later stating again that things are not fixed.
Clearly v2.27.1-6ubuntu3.6 is
Upstream for util-linux is at https://github.com/karelzak/util-linux
Has this been reported as an issue there before, and now fixed?
Can you find the relevant versions that fix this in that repository?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages
This is very clear now, thank you!
** Changed in: util-linux (Ubuntu)
Status: Incomplete => New
** Changed in: ubuntu-power-systems
Status: Incomplete => New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to util
** Changed in: icu (Ubuntu Eoan)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to icu in Ubuntu.
https://bugs.launchpad.net/bugs/1827391
Title:
Japanese era Reiwa SRU
Status in icu packag
Will do! thanks for digging into this even though it's well, busybox
issue.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to busybox in Ubuntu.
https://bugs.launchpad.net/bugs/1828282
Title:
busybox 1.30.1 crashes bzip2 test
@IBM
Please close your LTC bugzilla entry. We will continue to use this LP issue to
pursue busybox upstream. Thanks a lot for your input!
** Changed in: busybox (Ubuntu)
Status: New => Triaged
** Changed in: glibc (Ubuntu)
Status: New => Invalid
--
You received this bug notificat
** Also affects: e2fsprogs (Ubuntu)
Importance: Undecided
Status: New
** Changed in: lvm2 (Ubuntu)
Status: Incomplete => Invalid
** Changed in: e2fsprogs (Ubuntu)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch
Ubuntu core devices forced set LZMA which is now unsupported, fixing to
use LZ4 on these now as well.
** Also affects: initramfs-tools-ubuntu-core (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages,
$ cat /boot/config-5.0.0-16-generic | grep LOG_BUF
CONFIG_LOG_BUF_SHIFT=18
CONFIG_PRINTK_SAFE_LOG_BUF_SHIFT=13
$ uname -a
Linux doerfel 5.0.0-16-generic #17-Ubuntu SMP Wed May 15 10:54:19 UTC 2019
aarch64 aarch64 aarch64 GNU/Linux
And journal shows complete kernel boot messages, thus this all no
** Description changed:
[Impact]
* OpenSSL 1.1.1 is an LTS release upstream, which will continue to
receive security support for much longer than 1.1.0 series will.
* OpenSSL 1.1.1 comes with support for TLS v1.3 which is expected to be
rapidly adopted due to increased set of sup
** Changed in: console-setup (Ubuntu Xenial)
Status: In Progress => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to console-setup in Ubuntu.
https://bugs.launchpad.net/bugs/1604737
Title:
headless installat
On fresh disco and up installations this "just works" due to /usr-merge
by default.
On prior releases bin dir is configurable at lvm build time, which we
set to /bin (as that's where we want lvm2 utils to end up), but that's
not the location of systemd-run.
Needs a manual patch to lvm2, to suppor
** Bug watch added: Busybox Bugzilla #11896
https://bugs.busybox.net/show_bug.cgi?id=11896
** Also affects: busybox via
https://bugs.busybox.net/show_bug.cgi?id=11896
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member of Ubuntu
Touc
** Changed in: busybox (Ubuntu)
Status: Triaged => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to busybox in Ubuntu.
https://bugs.launchpad.net/bugs/1828282
Title:
busybox 1.30.1 crashes bzip2 test cas
** Also affects: packagekit (Ubuntu Eoan)
Importance: Medium
Status: Triaged
** Tags removed: rls-ee-incoming
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to packagekit in Ubuntu.
https://bugs.launchpad.net/bugs/182
Nice!
It is valgrind clean now, but the testsuite fails:
$ ./bunzip2.tests
PASS: bunzip2: doesnt exist
PASS: bunzip2: unknown suffix
PASS: bunzip2: already exists
PASS: bunzip2: stream unpack
PASS: bunzip2: delete src
PASS: bunzip2: test_bz2 file
PASS: bunzip2: pbzip_4m_zeros file
PASS: bunzip2:
Test suite got fixed in master too, all is good:
https://git.busybox.net/busybox/commit/?id=b2c123d484dbe261758f27ced213f4649173803b
Thanks a lot for the quick fixes! Included in Ubuntu devel series.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages,
** Also affects: libwww-perl (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1797386
Title:
[SRU] OpenSSL 1.1.1 to 18.0
** Changed in: python-tornado (Ubuntu)
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1797386
Title:
[SRU] OpenSSL 1.1.1 to 18.04 L
It's a critical but in the Ubuntu platform if the very first kernel log
line is not available in the system logs.
And it is present on all arches, apart from the identified buggy arm64
which is in-flight being fixed (in eoan-proposed & disco-proposed with
other releases to follow).
cmdline-upstar
"and so causes autopkgtest failures." is not true.
>From http://autopkgtest.ubuntu.com/packages/systemd/bionic/amd64
E.g.
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-bionic/bionic/amd64/s/systemd/20190529_090547_1f40a@/log.gz
Ensure that
Failing to remove the module, means the testcase / systemd has failed.
Which has been diagnosed and narrowed down to a bug in systemd.
Whilst the proposed improvements to the test case are ok, they make it
skip a lot more without making it more fool proof.
Ideally, I'd like to make the testcase
The addition of the cryptsetup.target apply in the fstab test case is also
wrong.
We are trying to test that automatic apply of local-fs.target correctly
triggers the cryptsetup mounting as a dependency, without any special
cryptsetup.target poking first.
--
You received this bug notification
** Also affects: systemd (Ubuntu Bionic)
Importance: Undecided
Status: New
** Also affects: systemd (Ubuntu Cosmic)
Importance: Undecided
Status: New
** Also affects: systemd (Ubuntu Disco)
Importance: Undecided
Status: New
** Also affects: systemd (Ubuntu Eoan)
** Changed in: systemd (Ubuntu Eoan)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1825378
Title:
systemd-networkd doesn't set
** Changed in: systemd (Ubuntu Eoan)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1825997
Title:
boot-smoke fails due to runn
** Changed in: systemd (Ubuntu)
Status: New => Confirmed
** Changed in: systemd (Ubuntu)
Importance: Undecided => High
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bu
Does installing finalrd package help?
It should pivot off root on shutdown, and unmount separate /var and
/var/log cleanly.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/17
** Changed in: systemd (Ubuntu Eoan)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1814373
Title:
storage / luks / dmsetup reg
** Changed in: systemd (Ubuntu Eoan)
Status: In Progress => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1829347
Title:
systemd autopkgtest 'storage' fa
** Changed in: systemd (Ubuntu Eoan)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1829450
Title:
test_systemd_fsck_with_plymo
Oh joy! This is like the ultimate "have you tried turning it on and off
again".
I wonder, if shutdown should inhibit sleep as its first action. And/or
sleep api should be checking for in flight shutdown transaction.
I agree this is a bad behaviour.
--
You received this bug notification because
Only affects xenial at the moment.
** Changed in: systemd (Ubuntu Xenial)
Status: In Progress => Triaged
** Changed in: systemd (Ubuntu)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is sub
** Package changed: systemd (Ubuntu) => ceph (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1828617
Title:
Hosts randomly 'losing' disks, breaking ceph-osd servic
enp0s31f6: Could not set route: Invalid argument
enp0s31f6: Routes set
addresses:
- 95.216.96.148/26
gateway4: 95.216.96.129
routes:
- on-link: true
to: 95.216.96.148/26
via: 95.216.96.129
I do not quite understand what above is supposed to mean.
95.
The route looks invalid to me, please clarify
** Changed in: systemd (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1826459
Ti
** Description changed:
[Impact]
* OpenSSL 1.1.1 is an LTS release upstream, which will continue to
receive security support for much longer than 1.1.0 series will.
* OpenSSL 1.1.1 comes with support for TLS v1.3 which is expected to be
rapidly adopted due to increased set of sup
Lol
On Thu, 30 May 2019, 20:20 Rafael David Tinoco, <
rafaeldtin...@kernelpath.com> wrote:
> xnox, it looks like you're missing a "$" in md5sum command from:
>
>
> https://launchpadlibrarian.net/426017250/systemd_240-6ubuntu7_240-6ubuntu8.diff.gz
>
> for the -proposed systemd version:
>
> /sbin/d
** Tags added: rls-ee-incoming
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to initramfs-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1831252
Title:
panic=-1 is completely ignored by the initrd causing unexpected
beha
autopkgtest regressions:
libgeo-coder-googlev3-perl request to badtest + sru to unbreak autopkgtests
https://bugs.launchpad.net/ubuntu/+source/libgeo-coder-googlev3-perl/+bug/1831443
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscrib
RE: perl openssl read/write|_all changes
OpenSSL 1.1.1 has enabled AUTO_RETRY by default and all non-application
data records are retried by default. Thus this is effectively a no-
change for higher level users as retries have moved further down the
stack to libssl itself.
Upstream executes testm
autopkgtest regressions:
some kernel flavours are failing to build from source due to running out
of memory whilst compiling mellanox drivers. Requesting to add all
kernel flavours to big_packages configuration in
https://bugs.launchpad.net/auto-package-testing/+bug/1831446
--
You received this
How does your vlan .netdev unit looks like?
You need something that creates the vlan device on top of the selected
underlying device, ie.:
$ cat enp3s0.2.netdev
[NetDev]
Name=enp3s0.2
Kind=vlan
[VLAN]
Id=2
Without that, there won't be vlan device created (nor visiable in $ ip a), and
thus no
Please attach output from networkd on boot prior to / without the extra
dhclient unit if you can.
$ networkctl | pastebinit
$ journalctl -b -u systemd-networkd | pastebinit
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sys
Is that the full networkd config?
Slightly confused why enp3s0 is degraded. Does it have a cable plugged
in?
Could you tar up and share /run/systemd/netif ?
Does adding below
[DHCP]
ClientIdentifier=mac
to the enp3s0.2.network help?
--
You received this bug notification because you are a mem
Hahahhahaha
So
yeah
because the _host_ bootid is in use =) and you didn't reboot the host.
Specifically, everything in systemd reads
/proc/sys/kernel/random/boot_id and that appears to be the same as on
the host.
Maybe lxc/lxd should fake that file and generate new "boot_id" each time
c
Well, it's "better" but still failing.
http://autopkgtest.ubuntu.com/packages/systemd/eoan/ppc64el
** Changed in: systemd (Ubuntu Eoan)
Status: Fix Released => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to
This is still not fixed.
** Changed in: systemd (Ubuntu)
Status: Fix Released => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1803993
Title:
Password a
lz4 is now called with the legacy option on.
** Changed in: initramfs-tools (Ubuntu)
Status: New => Fix Committed
** Changed in: initramfs-tools (Ubuntu)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded pac
Public bug reported:
Use `lz4 -9 -l` compression for initramfs by default as discussed on
ubuntu-devel.
This would also pull the lz4 package into main
https://lists.ubuntu.com/archives/ubuntu-devel/2019-June/040726.html
** Affects: initramfs-tools (Ubuntu)
Importance: Undecided
St
** Changed in: lz4 (Ubuntu)
Status: New => Confirmed
** Changed in: initramfs-tools (Ubuntu)
Status: New => Fix Committed
** Changed in: live-build (Ubuntu)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded pa
** Changed in: livecd-rootfs (Ubuntu)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to initramfs-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1831736
Title:
[MIR] lz4 by default
Statu
Can you boot with old initrd from the boot menu options?
Can you unlock things by-hand from the initramfs shell, and continue the
boot by exiting the shell?
What is the expected layout of things that should be done? And what are
the contents of /etc/crypttab /etc/fstab ?
** Changed in: lvm2 (Ub
** Tags removed: verification-needed verification-needed-disco
** Tags added: verification-done verification-done-disco
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1825212
/usr/lib/apt/apt.systemd.daily should force set a Useragent
apt.systemd.daily, for all operations.
irrespective how/who/what invoked /usr/lib/apt/apt.systemd.daily
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu
** Changed in: lz4 (Ubuntu)
Status: Confirmed => Fix Released
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to initramfs-tools in Ubuntu.
https://bugs
** Description changed:
Use `lz4 -9 -l` compression for initramfs by default as discussed on
ubuntu-devel.
This would also pull the lz4 package into main
https://lists.ubuntu.com/archives/ubuntu-devel/2019-June/040726.html
+
+ [Regression Potential]
+
+ We are trying to optimize fo
** Description changed:
Use `lz4 -9 -l` compression for initramfs by default as discussed on
ubuntu-devel.
This would also pull the lz4 package into main
https://lists.ubuntu.com/archives/ubuntu-devel/2019-June/040726.html
[Regression Potential]
We are trying to optimize fo
** Changed in: initramfs-tools (Ubuntu)
Assignee: (unassigned) => Dimitri John Ledkov (xnox)
** Changed in: initramfs-tools (Ubuntu)
Importance: Undecided => High
** Changed in: initramfs-tools (Ubuntu)
Milestone: None => ubuntu-19.06
--
You received this bug notificatio
I will go with dracut syntax here:
vlan=:
And will only support the .id naming, e.g.:
vlan=eth0.1:eth0
As i'd think dracut syntax is more popular, despite being a bit
backwards parsing the pairs.
With added support, that phydevice is activated as well on s390x.
--
You received this bug notifi
@Martin
Encrypted root is available in Ubuntu.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to initramfs-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1382054
Title:
Add support for configuring VLAN interfaces in the in
Public bug reported:
static ip= address configuration does not end up in netplan file
klibc ipconfig process ip=...:$proto and dumps the state into a file,
which is then parsed to generate runtime netplan configs.
For static ip configuration ipconfig parses $proto values "off" "none"
"static" as
Normally, postinst should only hint a trigger to run initramfs update.
And not force creation of an initrd.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to initramfs-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1792189
Ti
I.e. instead of the current
$ cat debian/linux-firmware.postinst
#!/bin/sh
set -e
if [ -x /usr/sbin/update-initramfs ]; then
/usr/sbin/update-initramfs -u -k all
fi
#DEBHELPER#
It should do instead
$ cat cat debian/linux-firmware.triggers
activate-noawait update-initramfs
** Chan
Public bug reported:
unmkinitramfs fails with lz4 compressed initrds
Note:
$ lz4cat -t unmkinitramfs_Cz6Yl9
File extension doesn't match expected LZ4_EXTENSION (.lz4); will not process
file: unmkinitramfs_Cz6Yl9
And
$ lsinitramfs /boot/initrd.img
kernel
kernel/x86
kernel/x86/microcode
kernel
we really should not have published this SRU, as it has dependencies on
openssl 1.1.1 which is not published, and is thus now uninstallable.
=/
however it has been a while, so might as well wait for openssl 1.1.1 to
be published.
--
You received this bug notification because you are a member of
Ship it!
** Tags removed: verification-needed verification-needed-bionic
** Tags added: verification-done verification-done-bionic
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/
Follow roughly https://blog.felipe-alfaro.com/2005/11/18/setting-up-
certificate-authority-ca-using-openssl/ to setup CA
Generate req & spkac => however somehow my spkac only had the SPKAC=
line so I had to edit in:
countryName=AU
stateOrProvinceName=Some-State
organizationName=Internet Widgits P
** Changed in: openssl (Ubuntu Eoan)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1828215
Title:
openssl ca -spkac output regre
reset index.txt, and resigned pkac with upgraded openssl in eoan, the
output is pure text and can be read/parsed by humans and machines.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad
built and passed all autopkgtests on all architectures.
** Tags removed: verification-needed verification-needed-bionic
** Tags added: verification-done verification-done-bionic
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to
I don't think it follows.
For example, with an RSA key I can use SHA3-512.
Signature Algorithm: RSA-SHA3-512
The point is, that digests are not independant, and one cannot just use
any as they need to have well known identifiers as specified in the
relevant RFCs.
Ie.
https://tools.ietf.org/html
(specifically published RFCs defining the relevant digest-algo /
signature types format to be used in x.509 certificates / or any pki
generically. Just the definition of the math to calculate the digest is
not enough)
** Changed in: openssl (Ubuntu)
Status: Incomplete => Opinion
--
You re
No, we do not wish to support weak-ssl-ciphers, they are long obsolete
and dead.
If you need to access acient servers or use acient clients you can e.g.
launch precise in a lxd container with $ lxc launch ubuntu:precise
Which ones are you specifically after?
** Changed in: openssl (Ubuntu)
Note one can create .deb packages with arbitrary version numbers not
matching what is listed in debian/changelog.
And this package does that, for Spaß and clarity.
And both builds appear to produce binaries with version numbers
matching the underlying source gcc versions e.g. both builds produce:
Public bug reported:
[Impact]
* 18.04 LTS release with a long support time frame
* There are two versions of OpenSSL shipped in 18.04:
- obsolete 1.0.2
- current long term supported 1.1.1 series
* OpenSSH in 18.04 is the only package in main using libcrypto from 1.0.2
* The fact that Op
** Bug watch added: Debian Bug tracker #930366
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930366
** Also affects: initramfs-tools (Debian) via
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930366
Importance: Unknown
Status: Unknown
** Description changed:
+ [Impact]
+
** Tags added: rls-ee-incoming
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1832370
Title:
Unable to configure or disable TLS 1.3 via openssl.cnf
Status in openssl pack
** Patch added: "cosmic.debdiff"
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1828215/+attachment/5270242/+files/cosmic.debdiff
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.laun
** Patch added: "bionic.debdiff"
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1828215/+attachment/5270243/+files/bionic.debdiff
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.laun
** Patch added: "disco.debdiff"
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1828215/+attachment/5270241/+files/disco.debdiff
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launch
Public bug reported:
[Impact]
* Major libssl ugprades require services to be restarted, for them to continue
to function correctly at runtime.
* The maintainer scripts were not adjusted to trigger.
[Test Case]
* Install bionic from release pocket and install ssl using daemon e.g.
openssh-s
** Description changed:
[Impact]
- * openssl command line utility option parsing has regressed in 1.1.0i+
+ * openssl command line utility option parsing has regressed in 1.1.0i+
and produces binary output, where text output is expected, breaking
applications that parse that.
[Test
Run through CA setup, and ended up corrupting my terminal due to binary
output using the current bionic-updates 1.1.1-1ubuntu2.1~18.04.1
Upgraded to:
# dpkg-query -W openssl libssl1.1
libssl1.1:amd64 1.1.1-1ubuntu2.1~18.04.2
openssl 1.1.1-1ubuntu2.1~18.04.2
Rerun the procedure and ended up with t
Launched lxd container, with sshd & apache2 running and old ssl still
installed
# dpkg-query -W libssl1.1
libssl1.1:amd64 1.1.0g-2ubuntu4.3
Started journal monitoring to notice services restarts:
# journalctl -f &
Enabled -proposed, and checked that new libssl1.1 from proposed is
available
# a
Can you please provide sources of your app / example of behaviour that
needs fixing?
For us to prepare an SRU, we'd need to provide the following details:
https://wiki.ubuntu.com/StableReleaseUpdates#SRU_Bug_Template
Would you be able to provide details requested there? as in fill out the
below
The issue mentioned should be included in openssl 1.1.1b and hence fix
released in disco and eoan.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1832659
Title:
openssl 1.
@Steve
Ubuntu 18.04 ships salt 2017.7.4 which has been patched for openssl
1.1.1 compatibility.
Please see:
https://launchpad.net/ubuntu/+source/salt/2017.7.4+dfsg1-1ubuntu18.04.1
salt (2017.7.4+dfsg1-1ubuntu18.04.1) bionic; urgency=medium
* Cherrypick two upstream patches to fix compat with
Is it possible to get output from that script without &>/dev/null
redirection? to get all the stdout and stderr messages?
** Also affects: plainbox-provider-tpm2
Importance: Undecided
Status: New
** Changed in: openssl (Ubuntu)
Status: New => Incomplete
** Changed in: plainbox-
** Also affects: openssl (Ubuntu Disco)
Importance: Undecided
Status: New
** Also affects: openssl (Ubuntu Eoan)
Importance: Undecided
Status: New
** Also affects: openssl (Ubuntu Bionic)
Importance: Undecided
Status: New
** Also affects: openssl (Ubuntu Cosmic)
Removed /dev/null redirects and everything seems to be passing for
me
https://paste.ubuntu.com/p/4w5X6Rx3j9/
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1832689
Tit
Disco:
# dpkg-query -W openssl libssl1.1
libssl1.1:amd64 1.1.1b-1ubuntu2.2
openssl 1.1.1b-1ubuntu2.2
Run the procedure, got text output:
...
N8j0iLb0NtNIssnxRKKlw7NG4fGCOs7uHUbIcDg2u8nFM9bUoAQoUauRaNQjmWkZ
tx4U93+m6UnLSCxc9fyZWrax5mVL05C/AyB9H6NcfTYEyYyBPob5C4fG
-END CERTIFICATE-
Data Ba
Cosmic
# dpkg-query -W openssl libssl1.1
libssl1.1:amd64 1.1.1-1ubuntu2.3
openssl 1.1.1-1ubuntu2.3
Run the procedure, got text output:
...
tEInj8E8hiIwr3qgnHEeaoHrk2v3H82zDSI6NFalcwqCVeLtP3SeLFNvBYovISBX
JQrpUFhq1/+PwOMogxfRZQBmS1Za0Yxd8VK12M5smfI4WRDbqUbmZfqA
-END CERTIFICATE-
Data Base
** Tags added: regression-update
** Tags added: regression-release
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1832659
Title:
openssl 1.1.1-1ubuntu2.1~18.04.1 contains
** Changed in: openssl (Ubuntu)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1832522
Title:
openssl maintainer scripts do not t
501 - 600 of 2764 matches
Mail list logo