Your message dated Mon, 19 Sep 2022 22:13:54 +0000
with message-id <[email protected]>
and subject line Bug#1020308: fixed in openssl 3.0.5-4
has caused the Debian Bug report #1020308,
regarding openssl: Test 90-test_threads.t fails randomly.
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1020308: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1020308
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: openssl
Version: 3.0.5-3
Severity: serious
control: forwarded -1 https://github.com/openssl/openssl/issues/19243

After touching test/default.cnf in the last upload, the
90-test_threads.t test fails randomly on the last step
(test_lib_ctx_load_config()). Sometimes
        "malloc(): unaligned tcache chunk detected"
is visible. On amd64 it just segfaulted on the buildd, the retry
succeeded.

Sebastian

--- End Message ---
--- Begin Message ---
Source: openssl
Source-Version: 3.0.5-4
Done: Sebastian Andrzej Siewior <[email protected]>

We believe that the bug you reported is fixed in the latest version of
openssl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sebastian Andrzej Siewior <[email protected]> (supplier of updated 
openssl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 19 Sep 2022 21:59:19 +0200
Source: openssl
Architecture: source
Version: 3.0.5-4
Distribution: unstable
Urgency: medium
Maintainer: Debian OpenSSL Team <[email protected]>
Changed-By: Sebastian Andrzej Siewior <[email protected]>
Closes: 1020308
Changes:
 openssl (3.0.5-4) unstable; urgency=medium
 .
   * Add ssl_conf() serialisation (Closes: #1020308).
Checksums-Sha1:
 015acb6f577a5296b1ffe62549a405075677fb55 2604 openssl_3.0.5-4.dsc
 37b60dd98171ad69cf8dc38b0d40eaabd2912300 121912 openssl_3.0.5-4.debian.tar.xz
Checksums-Sha256:
 83a7c544870e652dac2213cf0ff8eeb8d9d890ba76e9706fa6675e0b2f0f2dbc 2604 
openssl_3.0.5-4.dsc
 6d0231e1b9166333adfd854fa9433c9d809733bf4c10eb3656e0b37531272e7a 121912 
openssl_3.0.5-4.debian.tar.xz
Files:
 fc0a37f25a585450c6d42ba62aed4e6a 2604 utils optional openssl_3.0.5-4.dsc
 4c87f66f04130b96401b62b8e73bcb97 121912 utils optional 
openssl_3.0.5-4.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=VNGY
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to