[Touch-packages] [Bug 1970076] Re: "User process fault: interruption code 0011 ilc:3" on SSH client/server upon Jammy upgrade

2022-04-26 Thread Ryan Finnie
I only have one s390x guest and adding another would be painful due to the slowness of its emulation :) but I have just tried removing all of /etc/ssh and reinstalling openssh-client/openssh-server, same crash. To be clear, this is only happening on my s390x guest. I have a few other non-x86

[Touch-packages] [Bug 1970076] Re: "User process fault: interruption code 0011 ilc:3" on SSH client/server upon Jammy upgrade

2022-04-23 Thread Ryan Finnie
** Tags added: apport-crash need-amd64-retrace ** Tags removed: need-amd64-retrace ** Tags added: need-s390x-retrace -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to openssh in Ubuntu. https://bugs.launchpad.net/bugs/1970076

[Touch-packages] [Bug 1970076] [NEW] "User process fault: interruption code 0011 ilc:3" on SSH client/server upon Jammy upgrade

2022-04-23 Thread Ryan Finnie
Public bug reported: This s390x VM has been upgraded to Jammy, including the host (qemu- system-s390x 1:6.2+dfsg-2ubuntu6). Now any attempt to use ssh, or any incoming sshd attempt immediately results in e.g.: ryan@s390x-dev:~$ ssh g...@github.com [ 433.672800] User process fault: interruption

[Touch-packages] [Bug 1870850] Re: Multi-line paste broken between kitty and nano 4.8 [focal]

2020-04-05 Thread Ryan Finnie
Thanks Benno. Yeah, I've tested that works (albeit with s,'\r',CR_CODE, on the - line since focal is currently 4.8). I've asked -release if it's possible to get a sync exception for 4.9.1-1 from sid since focal is past the freeze, rather than trying to SRU this (and e.g. LP: #1866820 crash);

[Touch-packages] [Bug 1870850] Re: Multi-line paste broken between kitty and nano 4.8 [focal]

2020-04-04 Thread Ryan Finnie
** Summary changed: - Multi-line paste broken between kitty ~0.15 and nano 8.4 [focal] + Multi-line paste broken between kitty and nano 4.8 [focal] -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to nano in Ubuntu.

[Touch-packages] [Bug 1870850] [NEW] Multi-line paste broken between kitty ~0.15 and nano 8.4 [focal]

2020-04-04 Thread Ryan Finnie
Public bug reported: Ubuntu 20.04 Focal beta (as of 2020-04-04) nano 4.8-1 What I expect to happen: multi-line paste into nano via kitty pastes multiple lines. What happens instead: pasted multi-line text is one line with no line breaks. There is a bit of a spat between the developers of kitty

[Touch-packages] [Bug 1807077] Re: [SRU] mountall crashes on udev node with missing devname

2019-01-10 Thread Ryan Finnie
Per https://wiki.ubuntu.com/QATeam/PerformingSRUVerification I had added the procedure and results to the description: TEST CASE: 1. Enable -proposed 2. apt-get install mountall=2.53ubuntu1 3. update-initramfs -k all -u 4. Reboot VERIFICATION DONE Rebooted successfully on affected Gen10 systems.

[Touch-packages] [Bug 1807077] Re: [SRU] mountall crashes on udev node with missing devname

2018-12-24 Thread Ryan Finnie
** Description changed: [Impact] - * udev block nodes without a devname will crash mountall, resulting in +  * udev block nodes without a devname will crash mountall, resulting in an unbootable system (emergency root shell) - * While this is not likely to happen in a matched

[Touch-packages] [Bug 1807077] Re: [SRU] mountall crashes on udev node with missing devname

2018-12-24 Thread Ryan Finnie
** Tags removed: verification-needed verification-needed-trusty ** Tags added: verification-done verification-done-trusty -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to mountall in Ubuntu.

[Touch-packages] [Bug 1807077] Re: [SRU] mountall crashes on udev node with missing devname

2018-12-06 Thread Ryan Finnie
** Changed in: mountall (Ubuntu Trusty) Importance: Undecided => High -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to mountall in Ubuntu. https://bugs.launchpad.net/bugs/1807077 Title: [SRU] mountall crashes on udev

[Touch-packages] [Bug 1807077] Re: [SRU] mountall crashes on udev node with missing devname

2018-12-06 Thread Ryan Finnie
Thanks. I saw xenial had mountall and figured maybe there was transition path where it was used, but if it's vestigial, I agree this should be trusty-only. ** Tags removed: xenial ** Patch removed: "lp1807077-xenial.debdiff"

[Touch-packages] [Bug 1807077] Re: mountall crashes on udev node with missing devname

2018-12-06 Thread Ryan Finnie
** Tags added: patch trusty xenial ** Also affects: mountall (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: mountall (Ubuntu Xenial) Importance: Undecided Status: New ** Summary changed: - mountall crashes on udev node with missing devname + [SRU]

[Touch-packages] [Bug 1807077] Re: mountall crashes on udev node with missing devname

2018-12-05 Thread Ryan Finnie
** Description changed: + [Impact] + + * udev block nodes without a devname will crash mountall, resulting in + an unbootable system (emergency root shell) + + * While this is not likely to happen in a matched distro/kernel + environment (it was discovered while needing to run a bionic 4.15

[Touch-packages] [Bug 1807077] Re: mountall crashes on udev node with missing devname

2018-12-05 Thread Ryan Finnie
** Patch added: "lp1807077-trusty.debdiff" https://bugs.launchpad.net/ubuntu/+source/mountall/+bug/1807077/+attachment/5219619/+files/lp1807077-trusty.debdiff -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to mountall in

[Touch-packages] [Bug 1807077] Re: mountall crashes on udev node with missing devname

2018-12-05 Thread Ryan Finnie
** Patch added: "lp1807077-xenial.debdiff" https://bugs.launchpad.net/ubuntu/+source/mountall/+bug/1807077/+attachment/5219620/+files/lp1807077-xenial.debdiff -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to mountall in

[Touch-packages] [Bug 1807077] [NEW] mountall crashes on udev node with missing devname

2018-12-05 Thread Ryan Finnie
Public bug reported: Running bionic's 4.15 kernel on trusty on an HPE DL385 Gen10 results in a device node for the NVMe controller, /devices/pci:40/:40:03.1/:43:00.0/nvme/nvme0/nvme0c33n1 which itself does not have a devname. When mountall gets to it: fsck_update: updating check

[Touch-packages] [Bug 1794629] Re: CVE-2018-15473 - User enumeration vulnerability

2018-10-13 Thread Ryan Finnie
** Patch added: "lp1794629-trusty.debdiff" https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1794629/+attachment/5200766/+files/lp1794629-trusty.debdiff -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to openssh in

[Touch-packages] [Bug 1794629] Re: CVE-2018-15473 - User enumeration vulnerability

2018-10-13 Thread Ryan Finnie
** Patch added: "lp1794629-artful.debdiff" https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1794629/+attachment/5200768/+files/lp1794629-artful.debdiff ** Patch removed: "bionic-upstream-delay-bailout-for-invalid-authenticating-user.patch"

[Touch-packages] [Bug 1794629] Re: CVE-2018-15473 - User enumeration vulnerability

2018-10-13 Thread Ryan Finnie
** Patch added: "lp1794629-bionic.debdiff" https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1794629/+attachment/5200767/+files/lp1794629-bionic.debdiff -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to openssh in

[Touch-packages] [Bug 1794629] Re: CVE-2018-15473 - User enumeration vulnerability

2018-10-13 Thread Ryan Finnie
All debdiffs tested in the wild (except artful). -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to openssh in Ubuntu. https://bugs.launchpad.net/bugs/1794629 Title: CVE-2018-15473 - User enumeration vulnerability Status in

[Touch-packages] [Bug 1794629] Re: CVE-2018-15473 - User enumeration vulnerability

2018-10-13 Thread Ryan Finnie
** Patch added: "lp1794629-xenial.debdiff" https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1794629/+attachment/5200765/+files/lp1794629-xenial.debdiff -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to openssh in

[Touch-packages] [Bug 1794629] Re: CVE-2018-15473 - User enumeration vulnerability

2018-10-11 Thread Ryan Finnie
** Patch added: "bionic-upstream-delay-bailout-for-invalid-authenticating-user.patch" https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1794629/+attachment/5200217/+files/bionic-upstream-delay-bailout-for-invalid-authenticating-user.patch -- You received this bug notification because

[Touch-packages] [Bug 1794629] Re: CVE-2018-15473 - User enumeration vulnerability

2018-10-11 Thread Ryan Finnie
FYI, Qualys is now considering CVE-2018-15473 a PCI-DSS fail condition (QID: 38726). -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to openssh in Ubuntu. https://bugs.launchpad.net/bugs/1794629 Title: CVE-2018-15473 - User

[Touch-packages] [Bug 1766106] Re: ntp.ubuntu.com not reliable, but used in standard configuration

2018-04-24 Thread Ryan Finnie
Thank you, 2001:67c:1560:8003::c8 availability has been fixed. $ ntpdate -q 2001:67c:1560:8003::c8 server 2001:67c:1560:8003::c8, stratum 2, offset 0.031201, delay 0.18932 24 Apr 13:10:37 ntpdate[26740]: adjust time server 2001:67c:1560:8003::c8 offset 0.031201 sec ** Changed in: systemd

[Touch-packages] [Bug 1702785] [NEW] High memory and "can't fork" on heavy long-lived cron daemon

2017-07-06 Thread Ryan Finnie
Public bug reported: Ubuntu 14.04.5 LTS, cron 3.0pl1-124ubuntu2 On a server with heavy cron use (a few thousand entries across cron.d / users, several runs per second, a few dozen forks running at any given time), cron will creep up in memory usage. Last I saw was 6GB RSS, at which point it

[Touch-packages] [Bug 1510322] [NEW] xenial-proposed tar 1.28-2 generates illegal instruction on ppc64el

2015-10-26 Thread Ryan Finnie
Public bug reported: Please disregard, this was attempted on a POWER7 host. ** Affects: tar (Ubuntu) Importance: Undecided Status: Invalid -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to tar in Ubuntu.

[Touch-packages] [Bug 1510322] Re: xenial-proposed tar 1.28-2 generates illegal instruction on ppc64el

2015-10-26 Thread Ryan Finnie
** Description changed: - Preparing to unpack .../tar_1.28-2_ppc64el.deb ... - Unpacking tar (1.28-2) over (1.27.1-2) ... - Setting up tar (1.28-2) ... - dpkg-deb: error: subprocess tar was killed by signal (Illegal instruction) - dpkg: error processing archive

[Touch-packages] [Bug 1501959] Re: "System error" on chfn / su with lxc-start --share-net

2015-10-01 Thread Ryan Finnie
** Description changed: When running `lxc-start --share net 1` on a trusty host with a trusty container, chfn / su (and presumably other utilities which use PAM) fail. Test case: lxc-create -t ubuntu -n test1 cat >/var/lib/lxc/test1/rootfs/config

[Touch-packages] [Bug 1501959] [NEW] "System error" on chfn / su with lxc-start --share-net

2015-10-01 Thread Ryan Finnie
Public bug reported: When running `lxc-start --share net 1` on a trusty host with a trusty container, chfn / su (and presumably other utilities which use PAM) fail. Test case: lxc-create -t ubuntu -n test1 cat >/var/lib/lxc/test1/rootfs/config

[Touch-packages] [Bug 314436] Re: package-diff can generate infinite output

2015-09-17 Thread Ryan Finnie
Same result with the 15.04 variant of the package in that PPA: root 19040 0.0 0.0 41620 1824 ?S18:52 0:00 \_ CRON lp_queue 19045 0.0 0.0 4396 608 ?Ss 18:52 0:00 | \_ /bin/sh -c nice -n 10

[Touch-packages] [Bug 1449461] Re: [SRU] New stable release 3.14.13

2015-04-28 Thread Ryan Finnie
If someone can produce a build of this, I can test it specifically as it relates to LP: #1443774 . -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to gtk+3.0 in Ubuntu. https://bugs.launchpad.net/bugs/1449461 Title: [SRU] New

[Touch-packages] [Bug 1443774] [NEW] Horizontal scrolling is backwards

2015-04-14 Thread Ryan Finnie
Public bug reported: Don't know where to report this specifically, sorry. In native gnome applications (file manager, gedit, etc), scrolling horizontally via Trackpoint middle-button scrolling is backwards: * Middle button + trackpoint move up = scroll up (expected) * Middle button + trackpoint

[Touch-packages] [Bug 1437767] Re: Icons contain pixellated artifacts

2015-04-02 Thread Ryan Finnie
Updating and rebooting trusty today did not help. Note in the original screenshot how the chevron in the terminal icon is lopsided (enlarged 400% in aa2.png), and the top edge of the disk icon at the bottom is jagged. Also, I've made aa1.gif (also at 400%), which shows when the security icon is

[Touch-packages] [Bug 1437767] Re: Icons contain pixellated artifacts

2015-04-02 Thread Ryan Finnie
** Attachment added: aa1.gif https://bugs.launchpad.net/ubuntu/+source/unity/+bug/1437767/+attachment/4364775/+files/aa1.gif -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to unity in Ubuntu.

[Touch-packages] [Bug 1437767] Re: Icons contain pixellated artifacts

2015-04-02 Thread Ryan Finnie
** Attachment added: aa2.png https://bugs.launchpad.net/ubuntu/+source/unity/+bug/1437767/+attachment/4364776/+files/aa2.png -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to unity in Ubuntu.

[Touch-packages] [Bug 1437767] [NEW] Icons contain pixellated artifacts

2015-03-28 Thread Ryan Finnie
Public bug reported: After upgrading from utopic to vivid beta, many (but apparently not all) icons in Unity contain pixellation artifacts, as if it's been scaled up very slightly. Please see the attachment and note the launcher, as well as Security Privacy which was highlighted when taking the