I regularly have this (my gnome-shell oopses every morning, probably
because of an extension somewhere). Attached is a screenshot from
apport-gtk.
** Attachment added: "Capture d’écran de 2021-08-17 09-21-26.png"
Can somebody confirm my assumptions on the architecture of the test ?
First, it sets up a veth with router_eth42 at one end and test_eth42 at
the other (the itf names might be different ?). dnsmasq is bound against
router_eth42 which is configured manually via iproute with both IPv4 and
IPv6
** Attachment added: "networkd-glib-2.34.trace"
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1940635/+attachment/5520981/+files/networkd-glib-2.34.trace
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in
I can now confirm that the bug has been introduced strictly by the glibc
2.34, and not another package in the -proposed pocket.
My reproduction steps were as following:
Boot an Ubuntu Impish qemu VM (fully up-to-date (funnily enough, far
from being a trivial thing to do, see at the bottom for
** Attachment added: "networkd-glib-2.34-3.trace"
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1940635/+attachment/5521156/+files/networkd-glib-2.34-3.trace
** Attachment removed: "networkd-glib-2.34.trace"
** Attachment added: "networkd-glib-2.33-3.trace"
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1940635/+attachment/5521155/+files/networkd-glib-2.33-3.trace
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd
Attached are new strace logs, I'll remove the previous files as there
was something wrong with my test setup, so the captured trace isn't
necessarily during the DHCPv6 tests.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to
Beginner error on my part : there are debug logs in networkd, I didn't
even check them. As often, it turns out part of the answer lies in
there.
Here are the logs from 2.33:
autopkgtest systemd-networkd[942]: test_eth42: Gained IPv6LL
autopkgtest systemd-networkd[942]: test_eth42:
Allright.
I was going to post in-depth investigation results to sum up what
stepping through the code taught me (pretty much nothing, it all goes
well until I lose the stepping thread due to callback/async stuff), but
right before sending the text I let GDB finish the program execution,
and lo
Removed request for sponsors, submitting MP against the packaging Git
repo instead.
** Merge proposal linked:
https://code.launchpad.net/~schopin/ubuntu/+source/pam/+git/pam/+merge/407168
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
Public bug reported:
Please sync dh-python 4.20201102+nmu1 (universe) from Debian unstable
(main)
Explanation of the Ubuntu delta and why it can be dropped:
* Disable the nosetests autopkg test. Unmaintained.
* Disable the nosetests autopkg test. Unmaintained.
* Fix DocTest.
-> Those have
Committed, but not released yet. The fix is in upstream v249, and
cherry-picked in the version currently in -proposed, but I believe it
got stuck because of the glibc transition?
** Changed in: systemd (Ubuntu Impish)
Status: In Progress => Fix Committed
--
You received this bug
Public bug reported:
This new upstream version consists only of a couple security fixes, and
should thus be merged into Impish.
Upstream changelog:
Changes between 1.1.1k and 1.1.1l [24 Aug 2021]
*) Fixed an SM2 Decryption Buffer Overflow.
In order to decrypt SM2 encrypted data an
** Patch added: "Diff to 1.1.1l-1 (Debian)"
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1943109/+attachment/5524338/+files/openssl_diff_from_debian.debdiff
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to
The package has also been uploaded to the following PPA:
https://launchpad.net/~schopin/+archive/ubuntu/test-
ppa/+sourcepub/12697790/+listing-archive-extra
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
** Patch added: "DIff to 1.1.1k-1ubuntu1 (Ubuntu)"
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1943109/+attachment/5524337/+files/openssl_diff_from_ubuntu.debdiff
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to
Uploaded by juliank, but I forgot to add the LP number in the changelog.
I'll change the status manually, and unsubscribe the sponsors list.
** Changed in: openssl (Ubuntu)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded
Turns out I cannot unsubscribe the sponsors :/
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1943109
Title:
Merge 1.1.1l-1 version from Debian
Status in openssl package
Public bug reported:
This patch bypasses the custom restarting logic backed into the postinst
script if the needrestart utility is present, as it allows sharing the
logic with the rest of the system.
It also changes the custom logic to compare the old package version to
the current one instead
** Attachment added: "V2 addressing comments by bdmurray on IRC."
https://bugs.launchpad.net/ubuntu/+source/pam/+bug/1935972/+attachment/5510741/+files/debdiff
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pam in
For hirsute, all but two were flaky that turned green on rerun. The
other ones will necessitate hints :
https://code.launchpad.net/~schopin/britney/+git/hints-ubuntu/+merge/406595
https://code.launchpad.net/~schopin/britney/+git/hints-ubuntu/+merge/406596
--
You received this bug notification
For the focal migration, I have asked for the following britney hints:
https://code.launchpad.net/~schopin/britney/+git/hints-ubuntu/+merge/406594
https://code.launchpad.net/~schopin/britney/+git/hints-ubuntu/+merge/406593
The other tests seem to be flaky.
--
You received this bug notification
what do you mean by "verified"?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1931994
Title:
[Ubuntu 20.04] OpenSSL bugs in the s390x AES code
Status in Ubuntu on IBM z
Verified on focal:
ubuntu@ubuntu:~$ dpkg-architecture --is s390x && [ "$(dpkg-query -W
-f='${Version}' libssl1.1)" = "1.1.1f-1ubuntu2.5" ] && gcc -o aes-test test.c
-lcrypto -lssl && ./aes-test && echo OK
OK
--
You received this bug notification because you are a member of Ubuntu
Touch seeded
This time properly tested and verified on bionic via juju/canonistack,
where I sadly cannot boot any other version. The test fails properly
there in the -updates version, and succeeds (without having to
recompile) with the version in -proposed.
In addition, I round-tripped a file through
Here's a debdiff containing a backported version of the feature. There
is also a small refactoring as it allowed me to easily integrate the new
feature in the build process.
** Changed in: zlib (Ubuntu)
Assignee: Canonical Foundations Team (canonical-foundations) => Simon
Chopin (scho
You'll find a built version of the package in my PPA :
https://launchpad.net/~schopin/+archive/ubuntu/test-
ppa/+sourcepub/12641334/+listing-archive-extra
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to zlib in Ubuntu.
Indeed, nice catch! The _32 and _64 variants weren't used anymore,
either.
Updated debdiff attached, and a ~ppa2 version has been uploaded to my
PPA.
** Patch added: "zlib.debdiff"
https://bugs.launchpad.net/ubuntu/+source/zlib/+bug/1932010/+attachment/5517264/+files/zlib.debdiff
--
You
/+listing-archive-extra
** Changed in: pam (Ubuntu)
Status: New => In Progress
** Changed in: pam (Ubuntu)
Assignee: (unassigned) => Simon Chopin (schopin)
** Patch added: "pam_from_debian.debdiff"
https://bugs.launchpad.net/ubuntu/+source/pam/+bug/1916509/+attachmen
Here's the diff from the Ubuntu branch, much more massive as it includes
the upstream diff...
** Patch added: "pam_from_ubuntu.debdiff"
https://bugs.launchpad.net/ubuntu/+source/pam/+bug/1916509/+attachment/5517278/+files/pam_from_ubuntu.debdiff
** Tags added: fr-1604
--
You received this
Public bug reported:
Impish currently ships with a version based on the upstream 1.1.1j,
while Debian bullseye/sid has 1.1.1k. Let's merge!
** Affects: openssl (Ubuntu)
Importance: Undecided
Assignee: Simon Chopin (schopin)
Status: In Progress
** Tags: fr-1605
** Changed
> However, I'm not quite sure why does
>
> ++#ifdef S390_CRC32_VX
> ++if (getauxval(AT_HWCAP) & HWCAP_S390_VX)
> ++return s390_crc32_vx;
> ++#endif
>
> work. For me getauxval() causes a segfault when called from an ifunc,
> that's why I have to use the s390-specific ifunc's hwcap
The merge was easy, as most of the diff in the upstream release comes
from patches that we already applied.
A build was uploaded to the following PPA:
https://launchpad.net/~schopin/+archive/ubuntu/test-
ppa/+sourcepub/12642677/+listing-archive-extra
Attached is a debdiff from the Ubuntu
** Patch added: "openssl_diff_from_debian.debdiff"
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1939544/+attachment/5517304/+files/openssl_diff_from_debian.debdiff
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to
Removed previous patches, as there was a small issue with the changelog
(no bug number). Reattaching them now :)
** Patch removed: "openssl_diff_from_ubuntu.debdiff"
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1939544/+attachment/5517303/+files/openssl_diff_from_ubuntu.debdiff
**
** Patch added: "pam_from_debian.debdiff"
https://bugs.launchpad.net/ubuntu/+source/pam/+bug/1916509/+attachment/5517313/+files/pam_from_debian.debdiff
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pam in Ubuntu.
Deleting attachments as they're superseded by these new versions. First
the diff against Ubuntu, followed by the one against Debian for
reference.
** Patch removed: "pam_from_ubuntu.debdiff"
I don't have access to your bugzilla, so I'm assuming you pointed to
your own patch and its crc32.c section where you pass hwcap by argument
and call it earlier in the stack? If so, I've implemented this approach
in this new debdiff, and the PPA has been updated as well :-).
Michael, if you're
Public bug reported:
Hello,
As part of a rebuild against OpenSSL3, this package failed to build on one or
several architectures. You can find the details of the rebuild at
https://people.canonical.com/~schopin/rebuilds/openssl-3.0.0-impish.html
or for the amd64 failed build, directly at
Hi Sam,
Quoting Sam Hartman (2021-10-01 16:13:18)
> >>>>> "Simon" == Simon Chopin <1945...@bugs.launchpad.net> writes:
> Simon> We're planning to transition to OpenSSL 3.0 for the 22.04
> Simon> release, and consider this issue as blocking
Public bug reported:
Hello,
As part of a rebuild against OpenSSL3, this package failed to build on one or
several architectures. You can find the details of the rebuild at
https://people.canonical.com/~schopin/rebuilds/openssl-3.0.0-impish.html
or for the amd64 failed build, directly at
Public bug reported:
The latest systemd upload fails its tests against glibc 2.34. The
failing test is test-oomd-util within the unit-tests, with the following
logs:
Last pgscan 33 greater than current pgscan 1 for /herp.slice/derp.scope. Using
last pgscan of zero.
Last pgscan 33 greater than
Funny thing, though :
https://autopkgtest.ubuntu.com/results/autopkgtest-
impish/impish/arm64/s/systemd/20210830_074606_ed6ee@/log.gz -> tests
triggered by the systemd upload. The mentioned test passed. Even though
the libc version *is the same* (2.34-0ubuntu1 has been pulled to satisfy
Fixed via Debian sync of version 0.32.1
** Changed in: neon27 (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to neon27 in Ubuntu.
https://bugs.launchpad.net/bugs/1945958
Title:
I've just uploaded a new version to my PPA, with a patch from
https://github.com/openssl/openssl/pull/17041 that should fix this.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
Public bug reported:
OpenSSL 3.0, which is planned to land in the archive Very Soon™, has
moved quite a few algorithms to its "legacy" provider, which isn't
loaded by default. Some of those algorithms are used in various
protocols implemented by wpa_supplicant, so it's likely that the package
I've uploaded a package to
https://launchpad.net/~schopin/+archive/ubuntu/test-ppa/+packages
based on the above MR. autopkgtests against -proposed ran fine on amd64.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to krb5 in
** Changed in: openssl (Ubuntu)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1943109
Title:
Merge 1.1.1l-1 version from
For the record : https://salsa.debian.org/debian/krb5/-/merge_requests/6
I plan on uploading (well, having someone upload) a version of krb5
based off this branch if it hasn't already hit Debian when we start the
transition.
--
You received this bug notification because you are a member of
*** This bug is a security vulnerability ***
Public security bug reported:
Upstream has released a new version 3.0.1, including a security fix.
https://mta.openssl.org/pipermail/openssl-announce/2021-December/000212.html
Attached is a debdiff for this upgrade. Alternatively, a packaged
version has been uploaded to the following PPA, just pop the last
changelog entry to get the proper uploadable version:
https://launchpad.net/~schopin/+archive/ubuntu/test-
ppa/+sourcepub/13051752/+listing-archive-extra
** Patch
** Tags added: rls-ff-incoming
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1953301
Title:
Segfault on AArch64 caused by OpenSSL affecting numerous packages
Status in
Sounds suspiciously similar to
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1951279 but I'd
like confirmation that the situation described in the meson issue
comment (TLS 1.2 with ECDHE-RSA-CHACHA20-POLY1305) also applies there
before marking as duplicate.
--
You received this bug
When I upload to my test PPA I always add a new entry "PPA upload" to
make sure that the whole entry is scrapped, including the ~ppa version
suffix. The actual entry is the one before that.
My usual sponsored uploads are based on debdiffs rather than direct PPA
versions so this has never be an
** Changed in: systemd (Ubuntu Focal)
Status: New => In Progress
** Changed in: systemd (Ubuntu Focal)
Assignee: (unassigned) => Simon Chopin (schopin)
** Changed in: systemd (Ubuntu Hirsute)
Status: New => In Progress
** Changed in: systemd (Ubuntu Hirsute)
** Changed in: systemd (Ubuntu Impish)
Status: Confirmed => In Progress
** Changed in: systemd (Ubuntu Impish)
Assignee: (unassigned) => Simon Chopin (schopin)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subs
** Changed in: systemd (Ubuntu Focal)
Status: In Progress => Fix Committed
** Changed in: systemd (Ubuntu Hirsute)
Status: In Progress => Fix Committed
** Changed in: systemd (Ubuntu Impish)
Status: In Progress => Fix Committed
--
You received this bug notification because
** Attachment added: "Standalone C program from the upstream test case"
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1931994/+attachment/5512579/+files/evp_extra_test.c
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
** Patch added: "Focal SRU debdiff"
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1931994/+attachment/5513254/+files/openssl_focal.debdiff
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1931994
Title:
[Ubuntu 20.04] OpenSSL bugs im s390x AES code
Status in Ubuntu on IBM z Systems:
Triaged
Status in openssl
** Patch added: "Bionic SRU debdiff"
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1931994/+attachment/5513255/+files/openssl_bionic.debdiff
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
** Patch added: "Impish debdiff"
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1931994/+attachment/5513257/+files/openssl_impish.debdiff
** Attachment removed: "Standalone C program from the upstream test case"
** Patch added: "Hirsute SRU debdiff"
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1931994/+attachment/5513256/+files/openssl_hirsute.debdiff
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
** Attachment removed: "Standalone C program from the upstream test case"
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1931994/+attachment/5512579/+files/evp_extra_test.c
** Attachment added: "Tiny test program"
Updated description in preparation for SRU requests
** Description changed:
Problem description:
+
+ When passing a NULL key to reset AES EVC state, the state wouldn't be
completely reset on s390x.
https://github.com/openssl/openssl/pull/14900
-
+
Solution available here:
Regarding the bugproxy test case, it should be disregarded: I was the
one who originally added it, but then found a much smaller and self-
contained test case, and removed the attachment. For some reason,
bugproxy didn't like that.
--
You received this bug notification because you are a member
Oh, and thank you very much for the upload, much appreciated :-)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1931994
Title:
[Ubuntu 20.04] OpenSSL bugs im s390x AES
The mosquitto test seems to be failing regardless of the version of
openssl, I'll take a look at puma.
On Tue, Jul 27, 2021 at 1:35 PM Gunnar Hjalmarsson <
1931...@bugs.launchpad.net> wrote:
> @Simon: autopkgtest for mosquitto and puma fails on s390x.
>
>
Thank you, Gunnar!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1931994
Title:
[Ubuntu 20.04] OpenSSL bugs im s390x AES code
Status in Ubuntu on IBM z Systems:
In
Blocks migration to -updates as the fixed mir package FTBFSe.
** Also affects: glibc (Ubuntu)
Importance: Undecided
Status: New
** Tags added: update-excuse
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to umockdev
Oh, sorry, I know see how my sentence is ambiguous. I meant that the
failing autopkgtests are fixed in the latest version of mir uploaded to
-proposed, but that version fails to build because of this bug. So the
mentioned fix is *not* for this bug.
--
You received this bug notification because
** Also affects: openssh (Ubuntu)
Importance: Undecided
Status: New
** Changed in: openssh (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
Public bug reported:
The latest bugfix release of the 3.0 branch is out, we should package it
for Jammy.
In the preliminary packaging I've done the test suite fails, i'm trying
to track down the cause ATM.
** Affects: openssl (Ubuntu)
Importance: Undecided
Status: New
** Tags:
To be clear, the root issue is that the server is using an outdated,
insecure protocol that has been deemed so for more than a decade, and
OpenSSL finally decided to disable it by default. The "proper" way to
fix this would be for them to upgrade.
Now, that being said, we live in the real world
... And while looking for what exactly to suggest upstream, I realized
that GitHub search only prints out the first match in a given file,
which mean I missed the config options part of
https://www.openssl.org/docs/man3.0/man3/SSL_CONF_cmd_value_type.html
(search for UnsafeLegacyServerConnect),
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1947588
Title:
Infinite Loop in OpenSSL s_server
Status in openssl package in Ubuntu:
New
Status in openssl source
Hi Matt, thanks for taking the time to report this, as well as
investigating the different versions that might be affected.
I just checked, and both Impish and Jammy are affected as well (the
latter using OpenSSL 3.0).
--
You received this bug notification because you are a member of Ubuntu
** Also affects: openssl (Ubuntu Jammy)
Importance: Undecided
Status: New
** Also affects: openssl (Ubuntu Focal)
Importance: Undecided
Status: New
** Also affects: openssl (Ubuntu Impish)
Importance: Undecided
Status: New
--
You received this bug notification
@suoko: could you retry with the current version from jammy (22.04)? The
Qt packages have been updated a couple of weeks ago with better OpenSSL
3 support, which hopefully fixes your issue?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
Disregard the (now deleted) comment regarding Focal, I got mixed up in
my terminals. Focal is affected, but Bionic is not.
I suspect this is caused by our patch that changes the semantics of
security level 2 to also drop support for (D)TLS < 1.2.
** Tags added: rls-ff-incoming rls-jj-incoming
** Tags removed: rls-ff-incoming
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1947588
Title:
Infinite Loop in OpenSSL s_server
Status in openssl package in Ubuntu:
Attached is the debdiff for the upgrade. You can also find the package
at https://launchpad.net/~schopin/+archive/ubuntu/test-
ppa/+sourcepub/13390252/+listing-archive-extra (mind the version
number).
Note the new Ubuntu-specific patch to disable some tests that use a
configuration that's invalid
Could you clarify what exactly you are trying to achieve? You mention
both a VPN and the RDP protocol. Knowing exactly which software you're
using could help us track down some more logs to know more about the
failure. Without more information there isn't much we can do.
--
You received this bug
I'm sorry, I still don't understand. Is Global Protect VPN a piece of
software that runs on your Ubuntu install? Do you use Remmina on top of
that, or is it a potential replacement? Which application is the one
emitting the handshake error?
** Changed in: openssl (Ubuntu)
Status: New =>
I had a look at what's going on there. My understanding (with the caveat
that the code of s_server is quite hard to follow, even within GDB) is
that when the socket receives the packet, the server goes on and try to
establish a connection, only to find out that it cannot because it has
an
I'm marking this bug as `Won't Fix` as this new behavior is a deliberate
upstream choice that is documented in their migration documentation
https://www.openssl.org/docs/manmaster/man7/migration_guide.html
Granted, the documentation in question isn't exactly obvious (search for
RFC 5746), but
Public bug reported:
Please merge the latest Debian version of this package.
** Affects: python-debian (Ubuntu)
Importance: Wishlist
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to python-debian in
Attached is a patch against the latest Debian version. The delta has
also been pushed here : https://salsa.debian.org/schopin/python-
debian/-/commits/external-zstd
and will be posted in a MR if athos doesn't pick it up in his own at
https://salsa.debian.org/python-debian-team/python-
** Tags added: fr-2035
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to python-debian in Ubuntu.
https://bugs.launchpad.net/bugs/1960404
Title:
merge python-debian 0.1.43 from Debian sid
Status in python-debian package in
Public bug reported:
Please sync acl 2.3.1-1 (main) from Debian unstable (main)
Explanation of the Ubuntu delta and why it can be dropped:
* No-change rebuild to build packages with zstd compression.
* Build with -fno-strict-aliasing
* No-change rebuild to drop the udeb package.
The
Hi,
The issue is that OpenSSL 3.0 changed the API, which breaks older code.
However, we chose not to ship OpenSSL 1.1 in parallel to 3.0 as that
would carry the expectation of having security support for 1.1.1, which
is EOL upstream in 2023.
Marking as Won't Fix, however it should be relatively
** Tags added: rls-jj-incoming
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1968047
Title:
Ubuntu 22.04 Beta - Unable to compile ruby version 2.7.5, 3.0.3 and
3.3.3
Changing back the status to New, as it is actually a display bug in
apport as found out in this Twitter thread:
https://twitter.com/NoraDotCodes/status/1511763913418891267
I couldn't reproduce on my system (Gnome-based)
---
Ubuntu Bug Squad volunteer triager
http://wiki.ubuntu.com/BugSquad
**
** Tags added: fr-2255
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1968997
Title:
openssl has catastrophic issues when locale set to TR_UTF8
Status in openssl package
Hi!
Could you run the follwoing command on your server certificate?
openssl x509 -in $SERVER_CRT -text | grep -i algorithm
With the new OpenSSL version, older certificates with SHA1 digests are
now invalid by default.
--
You received this bug notification because you are a member of Ubuntu
Public bug reported:
Imported from Debian bug http://bugs.debian.org/1051837:
Source: dh-python
Version: 6.20230825
Severity: normal
X-Debbugs-Cc: scho...@ubuntu.com
We have a FTBFS on src:pastescript because its test suite embeds a
FakePlugin Python package, including its .egg-info, and the
resh install)
** Changed in: apport (Ubuntu Lunar)
Assignee: Benjamin Drung (bdrung) => Simon Chopin (schopin)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/2038650
A version containing a fix for this has been uploaded to the Jammy queue
to be processed by the SRU team. Thanks, Adrien :)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
A version containing a fix for this has been uploaded to the Jammy queue
to be processed by the SRU team. Thanks, Adrien :)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
A version containing a fix for this has been uploaded to the Jammy queue
to be processed by the SRU team. Thanks, Adrien :)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
1 - 100 of 273 matches
Mail list logo