On 2023-08-26 14:50:09 [+0200], To sub...@bugs.debian.org wrote:
> Package: release.debian.org
> Control: affects -1 + src:openssl
> User: release.debian....@packages.debian.org
> Usertags: pu
> Tags: bullseye
> Severity: normal
> 
> This is an update of the openssl package to the 1.1.1v version, a patch 
> release
> (bug and security fixes). This has been long overdue and was delayed on
> my side mostly due to bad timing.
> This update contains fixes for the the following CVEs:
> 
>  - CVE-2023-3446 (Excessive time spent checking DH keys and parameters).
>  - CVE-2023-3817 (Excessive time spent checking DH q parameter value).
> 
> The NEWS/ CHANGES file lists more CVEs but those have been already
> fixed via d-security. These two have been rated as minor and are port of
> this pu.
> 
> Besides security fixes, this update contains non-CVE/security related
> fixes.
> I deployed this release on a handful buster/bullseye servers of mine
> with no known problems. Also I've seen no "regression" fixes on top in
> upstream's 1.1.1 branch. I am not (knowingly) able to run debci tests to
> comment on this. That said, I am not aware of a regression but willing
> to look into should something pop up.
> 
> [ Checklist ]
>   [x] *all* changes are documented in the d/changelog
>   [x] I reviewed all changes and I approve them
>   [x] attach debdiff against the package in (old)stable
>   [x] the issue is verified as fixed in unstable

Just a friendly note that this has been filled but did not make it to
the list.
 
Sebastian

Reply via email to