tags 622018 + pending
thanks

Dear maintainer,

I've prepared an NMU for socat (versioned as 2.0.0~beta4-1.1) and uploaded it to DELAYED/5. Please feel free to tell me if I should delay it longer.

--
Jakub Wilk
diffstat for socat-2.0.0~beta4 socat-2.0.0~beta4

 NEWS                     |    6 ++++
 changelog                |   13 ++++++++
 control                  |    2 -
 patches/03-Disable-SSLv2 |   69 +++++++++++++++++++++++++++++++++++++++++++++++
 patches/series           |    1 
 rules                    |    3 ++
 6 files changed, 93 insertions(+), 1 deletion(-)

diff -Nru socat-2.0.0~beta4/debian/NEWS socat-2.0.0~beta4/debian/NEWS
--- socat-2.0.0~beta4/debian/NEWS	1970-01-01 01:00:00.000000000 +0100
+++ socat-2.0.0~beta4/debian/NEWS	2012-04-22 11:29:17.000000000 +0200
@@ -0,0 +1,6 @@
+socat (2.0.0~beta4-1.1) experimental; urgency=low
+
+  Readline support has been disabled for license reason: GNU Readline license
+  (GPL) is incompatible with the OpenSSL license.
+
+ -- Jakub Wilk <[email protected]>  Sun, 22 Apr 2012 11:24:12 +0200
diff -Nru socat-2.0.0~beta4/debian/changelog socat-2.0.0~beta4/debian/changelog
--- socat-2.0.0~beta4/debian/changelog	2010-08-03 08:34:34.000000000 +0200
+++ socat-2.0.0~beta4/debian/changelog	2012-04-22 11:29:17.000000000 +0200
@@ -1,3 +1,16 @@
+socat (2.0.0~beta4-1.1) experimental; urgency=low
+
+  * Non-maintainer upload.
+  * Disable readline support (closes: #632481). GNU Readline license (GPL) is
+    incompatible with the OpenSSL license. Thanks to Julien Cristau for the
+    bug report.
+    + Pass --disable-readline to the configure script.
+    + Remove libreadline5-dev from Build-Depends.
+  * Disable SSLv2 support (closes: #622018). Thanks to Lucas Nussbaum for the
+    bug report and Julien Cristau for the patch.
+
+ -- Jakub Wilk <[email protected]>  Sun, 22 Apr 2012 11:24:12 +0200
+
 socat (2.0.0~beta4-1) experimental; urgency=low
 
   * New upstream release.
diff -Nru socat-2.0.0~beta4/debian/control socat-2.0.0~beta4/debian/control
--- socat-2.0.0~beta4/debian/control	2010-08-03 08:32:59.000000000 +0200
+++ socat-2.0.0~beta4/debian/control	2012-04-22 10:52:46.000000000 +0200
@@ -3,7 +3,7 @@
 Priority: extra
 Maintainer: Chris Taylor <[email protected]>
 Homepage: http://www.dest-unreach.org/socat/socat-version2.html
-Build-Depends: debhelper (>= 7.0.50~), libreadline5-dev, libssl-dev,
+Build-Depends: debhelper (>= 7.0.50~), libssl-dev,
                libwrap0-dev, quilt
 Standards-Version: 3.9.1
 
diff -Nru socat-2.0.0~beta4/debian/patches/03-Disable-SSLv2 socat-2.0.0~beta4/debian/patches/03-Disable-SSLv2
--- socat-2.0.0~beta4/debian/patches/03-Disable-SSLv2	1970-01-01 01:00:00.000000000 +0100
+++ socat-2.0.0~beta4/debian/patches/03-Disable-SSLv2	2012-04-22 11:17:57.000000000 +0200
@@ -0,0 +1,69 @@
+Description: disable SSLv2 support
+ Disable use of SSLv2 functions when they are not supported by OpenSSL itself
+ (e.g. in OpenSSL >= 1.0 in Debian).
+Author: Julien Cristau <[email protected]>
+Bug-Debian: http://bugs.debian.org/622018
+Forwarded: no
+Last-Update: 2012-04-22
+
+--- a/sslcls.c
++++ b/sslcls.c
+@@ -35,6 +35,7 @@
+    return result;
+ }
+ 
++#ifndef OPENSSL_NO_SSL2
+ SSL_METHOD *sycSSLv2_client_method(void) {
+    SSL_METHOD *result;
+    Debug("SSLv2_client_method()");
+@@ -50,6 +51,7 @@
+    Debug1("SSLv2_server_method() -> %p", result);
+    return result;
+ }
++#endif
+ 
+ SSL_METHOD *sycSSLv3_client_method(void) {
+    SSL_METHOD *result;
+--- a/xio-openssl.c
++++ b/xio-openssl.c
+@@ -798,9 +798,12 @@
+ 
+    if (!server) {
+       if (me_str != 0) {
++#ifndef OPENSSL_NO_SSL2
+ 	 if (!strcasecmp(me_str, "SSLv2") || !strcasecmp(me_str, "SSL2")) {
+ 	    method = sycSSLv2_client_method();
+-	 } else if (!strcasecmp(me_str, "SSLv3") || !strcasecmp(me_str, "SSL3")) {
++	 } else
++#endif
++	 if (!strcasecmp(me_str, "SSLv3") || !strcasecmp(me_str, "SSL3")) {
+ 	    method = sycSSLv3_client_method();
+ 	 } else if (!strcasecmp(me_str, "SSLv23") || !strcasecmp(me_str, "SSL23") ||
+ 		    !strcasecmp(me_str, "SSL")) {
+@@ -817,9 +820,12 @@
+       }
+    } else /* server */ {
+       if (me_str != 0) {
++#ifndef OPENSSL_NO_SSL2
+ 	 if (!strcasecmp(me_str, "SSLv2") || !strcasecmp(me_str, "SSL2")) {
+ 	    method = sycSSLv2_server_method();
+-	 } else if (!strcasecmp(me_str, "SSLv3") || !strcasecmp(me_str, "SSL3")) {
++	 } else
++#endif
++	 if (!strcasecmp(me_str, "SSLv3") || !strcasecmp(me_str, "SSL3")) {
+ 	    method = sycSSLv3_server_method();
+ 	 } else if (!strcasecmp(me_str, "SSLv23") || !strcasecmp(me_str, "SSL23") ||
+ 		    !strcasecmp(me_str, "SSL")) {
+--- a/sslcls.h
++++ b/sslcls.h
+@@ -10,8 +10,10 @@
+ 
+ void sycSSL_load_error_strings(void);
+ int sycSSL_library_init(void);
++#ifndef OPENSSL_NO_SSL2
+ SSL_METHOD *sycSSLv2_client_method(void);
+ SSL_METHOD *sycSSLv2_server_method(void);
++#endif
+ SSL_METHOD *sycSSLv3_client_method(void);
+ SSL_METHOD *sycSSLv3_server_method(void);
+ SSL_METHOD *sycSSLv23_client_method(void);
diff -Nru socat-2.0.0~beta4/debian/patches/series socat-2.0.0~beta4/debian/patches/series
--- socat-2.0.0~beta4/debian/patches/series	2010-08-03 08:31:50.000000000 +0200
+++ socat-2.0.0~beta4/debian/patches/series	2012-04-22 11:16:07.000000000 +0200
@@ -2,3 +2,4 @@
 00-Manpage
 01-Index
 02-ftbfs-kfreebsd
+03-Disable-SSLv2
diff -Nru socat-2.0.0~beta4/debian/rules socat-2.0.0~beta4/debian/rules
--- socat-2.0.0~beta4/debian/rules	2010-08-03 08:31:50.000000000 +0200
+++ socat-2.0.0~beta4/debian/rules	2012-04-22 10:51:04.000000000 +0200
@@ -3,4 +3,7 @@
 %:
 	dh $@
 
+override_dh_auto_configure:
+	dh_auto_configure -- --disable-readline
+
 override_dh_auto_test:

Reply via email to