The systemd update for eoan is not in -proposed but the libseccomp
updates (for all releases) are - the systemd update for eoan needs to be
released in conjunction with the libseccomp update as it fixes a
regression in systemd/eoan/i386 when used in conjunction with the
libseccomp updates.

The systemd/eoan update is on only in the security-proposed PPA as I
don't have upload rights and so needs to be sponsored.

I believe the packages are ready to be released - all autopkgtests are
passing now for all releases of libseccomp - except systemd/eoan/i386
(hence the additional update for it).

The autopkgtests from the security-proposed PPA for systemd
https://people.canonical.com/~platform/security-
britney/current/security_eoan_excuses.html#systemd look pretty good.

openssh is failing - but this version 1:8.0p1-6build1 is failing already
- see http://autopkgtest.ubuntu.com/packages/o/openssh/eoan/amd64 for
instance where this version also failed in the same manner recently a
number of times.

pds, prometheus and stunnel4 are also failing but again these same
versions are already failing for the regular autopkgtests -
http://autopkgtest.ubuntu.com/packages/p/pdns/eoan/amd64
http://autopkgtest.ubuntu.com/packages/p/prometheus/eoan/amd64
http://autopkgtest.ubuntu.com/packages/s/stunnel4/eoan/amd64

snapd is failing for i386 but again is already failing for the same
version at http://autopkgtest.ubuntu.com/packages/s/snapd/eoan/i386

And similarly ubuntu-drivers-common is also failing for i386 but is
already failing for this same version -
http://autopkgtest.ubuntu.com/packages/u/ubuntu-drivers-common/eoan/i386

So I am confident this is ready to be released.

First, systemd 242-7ubuntu3.11  needs to be sponsored from the ubuntu-
security-proposed PPA to -proposed and then we can look at promoting all
the libseccomp updates and this systemd update for eoan to -updates (and
the security team can publish to -security and issue a USN once all are
in -updates).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876055

Title:
  SRU: Backport 2.4.3-1ubuntu3 from groovy to focal/eoan/bionic/xenial
  for newer syscalls for core20 base and test suite robustness

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libseccomp/+bug/1876055/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to