Your message dated Tue, 31 Mar 2020 22:18:44 +0000
with message-id <[email protected]>
and subject line Bug#955442: fixed in openssl 1.1.1f-1
has caused the Debian Bug report #955442,
regarding openssl breaks libio-socket-ssl-perl autopkgtest: 20 times "not ok"
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
955442: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=955442
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: openssl, libio-socket-ssl-perl
Control: found -1 openssl/1.1.1e-1
Control: found -1 libio-socket-ssl-perl/2.067-1
Severity: serious
Tags: sid bullseye
X-Debbugs-CC: [email protected]
User: [email protected]
Usertags: breaks needs-update

Dear maintainer(s),

With a recent upload of openssl the autopkgtest of libio-socket-ssl-perl
fails in testing when that autopkgtest is run with the binary packages
of openssl from unstable. It passes when run with only packages from
testing. In tabular form:

                       pass            fail
openssl                from testing    1.1.1e-1
libio-socket-ssl-perl  from testing    2.067-1
all others             from testing    from testing

I copied some of the output at the bottom of this report.

Currently this regression is blocking the migration of openssl to
testing [1]. Due to the nature of this issue, I filed this bug report
against both packages. Can you please investigate the situation and
reassign the bug to the right package?

More information about this bug and the reason for filing it can be found on
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation

Paul

[1] https://qa.debian.org/excuses.php?package=openssl

https://ci.debian.net/data/autopkgtest/testing/amd64/libi/libio-socket-ssl-perl/4752372/log.gz

ok # [client] Client SSL Handshake OK
not ok # [client] Hi!
not ok # fatal error at ./t/testlib.pl line 171.

Dubious, test returned 1 (wstat 256, 0x100)
Failed 8/16 subtests

Attachment: signature.asc
Description: OpenPGP digital signature


--- End Message ---
--- Begin Message ---
Source: openssl
Source-Version: 1.1.1f-1
Done: Sebastian Andrzej Siewior <[email protected]>

We believe that the bug you reported is fixed in the latest version of
openssl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sebastian Andrzej Siewior <[email protected]> (supplier of updated 
openssl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 31 Mar 2020 23:59:59 +0200
Source: openssl
Architecture: source
Version: 1.1.1f-1
Distribution: unstable
Urgency: medium
Maintainer: Debian OpenSSL Team <[email protected]>
Changed-By: Sebastian Andrzej Siewior <[email protected]>
Closes: 955442
Changes:
 openssl (1.1.1f-1) unstable; urgency=medium
 .
   * New upstream version
    - Revert the change of EOF detection to avoid regressions in applications.
      (Closes: #955442).
Checksums-Sha1:
 5d201ffef077c487bd785c1048203e77cef608a6 2446 openssl_1.1.1f-1.dsc
 238e001ea1fbf19ede43e36209c37c1a636bb51f 9792828 openssl_1.1.1f.orig.tar.gz
 695c021376a62205a399b3ad8584dce4f857da97 488 openssl_1.1.1f.orig.tar.gz.asc
 a14ae544a8ed5763c2f9b7cc68ab1395d8447bb1 84216 openssl_1.1.1f-1.debian.tar.xz
Checksums-Sha256:
 8c987eaf740e4ca8812d769d58ef1d632c84936c0697711cc0914c1f79b22125 2446 
openssl_1.1.1f-1.dsc
 186c6bfe6ecfba7a5b48c47f8a1673d0f3b0e5ba2e25602dd23b629975da3f35 9792828 
openssl_1.1.1f.orig.tar.gz
 e9c68097b05be8873e41bd33a9269378ca58e515fbaa30a512c315b602d41dda 488 
openssl_1.1.1f.orig.tar.gz.asc
 8abe548171d98baf47ca87b747ac7c7654a5f491eeb8a7876511f6a5ea14a338 84216 
openssl_1.1.1f-1.debian.tar.xz
Files:
 61cc2cff7f9d1d79e9ea7175a5dbb009 2446 utils optional openssl_1.1.1f-1.dsc
 3f486f2f4435ef14b81814dbbc7b48bb 9792828 utils optional 
openssl_1.1.1f.orig.tar.gz
 f8b2a514417d236bbc8acad583cc4701 488 utils optional 
openssl_1.1.1f.orig.tar.gz.asc
 237e076d609f767f7893e485b548313a 84216 utils optional 
openssl_1.1.1f-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=Rcqi
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to