Re: Bug#1051884: bullseye-pu: package openssl/1.1.1w-0~deb11u1

2023-10-02 Thread Sebastian Andrzej Siewior
On 2023-10-02 13:41:17 [+0200], Cyril Brulebois wrote: > Adam D. Barratt (2023-10-02): > > Unfortunately, the version format change from -0+deb11uX to -0~deb11uX > > has broken the installer. > > > > The udebs end up with dependencies of the form ">= 1.1.1w", which > > 1.1.1w-0~deb11u1 doesn't fu

Re: Bug#1051884: bullseye-pu: package openssl/1.1.1w-0~deb11u1

2023-10-02 Thread Cyril Brulebois
Adam D. Barratt (2023-10-02): > Unfortunately, the version format change from -0+deb11uX to -0~deb11uX > has broken the installer. > > The udebs end up with dependencies of the form ">= 1.1.1w", which > 1.1.1w-0~deb11u1 doesn't fulfil. Assuming I'm not missing anything, > could we have an upload

Re: Bug#1051884: bullseye-pu: package openssl/1.1.1w-0~deb11u1

2023-10-02 Thread Adam D. Barratt
On Wed, 2023-09-13 at 22:48 +0200, Sebastian Andrzej Siewior wrote: > OpenSSL upstream released 1.1.1w which the last stable update to the > 1.1.1 series because it is EOL since last Monday. > The update is fairly small and contains a few fixes for memory leaks. > The mentioned CVE

Re: Bug#1051884: bullseye-pu: package openssl/1.1.1w-0~deb11u1

2023-10-02 Thread Cyril Brulebois
Hi, Sebastian Andrzej Siewior (2023-09-13): > Package: release.debian.org > Control: affects -1 + src:openssl > User: release.debian@packages.debian.org > Usertags: pu > Tags: bullseye > Severity: normal > > OpenSSL upstream released 1.1.1w which the last stable upda

Re: debian-installer FTBFS after openssl transition

2022-05-24 Thread Julien Cristau
On Tue, May 24, 2022 at 09:30:46AM +0200, John Paul Adrian Glaubitz wrote: > Hi! > > I have observed debian-installer on some architectures such m68k, powerpc and > sparc64 > after the openssl transition. The issue does not affect all architectures, > ia64, hppa > and p

debian-installer FTBFS after openssl transition

2022-05-24 Thread John Paul Adrian Glaubitz
Hi! I have observed debian-installer on some architectures such m68k, powerpc and sparc64 after the openssl transition. The issue does not affect all architectures, ia64, hppa and ppc64 are not affected, for example. The failure looks like this: Building dependency tree... Done libcrypto3

Re: Bug#1003484: bullseye-pu: package openssl/1.1.1m-0+deb11u1

2022-03-18 Thread Kurt Roeckx
On Fri, Mar 18, 2022 at 10:22:57PM +0100, Sebastian Andrzej Siewior wrote: > On 2022-03-18 14:51:32 [+], Adam D. Barratt wrote: > > Boo. Hope you're doing better. > > Thanks, yes. > > > > I would also do the upload for Buster, would that work? I remember > > > that > > > the packages, that br

Re: Bug#1003484: bullseye-pu: package openssl/1.1.1m-0+deb11u1

2022-03-18 Thread Sebastian Andrzej Siewior
On 2022-03-18 14:51:32 [+], Adam D. Barratt wrote: > Boo. Hope you're doing better. Thanks, yes. > > I would also do the upload for Buster, would that work? I remember > > that > > the packages, that broken, were already uploaded a few cycles ago. > > Also as 1.1.1n? Yes. > I assume there

Re: Bug#1003484: bullseye-pu: package openssl/1.1.1m-0+deb11u1

2022-03-18 Thread Adam D. Barratt
On Fri, 2022-03-18 at 14:12 +0100, Sebastian Andrzej Siewior wrote: > On 2022-03-18 09:21:50 [+], Adam D. Barratt wrote: > > Apologies if the status here got confused - based on the above, I > > was > > assuming that in the absence of a negative response you would > > proceed > > with the 1.1.1

Re: Bug#1003484: bullseye-pu: package openssl/1.1.1m-0+deb11u1

2022-03-18 Thread Sebastian Andrzej Siewior
On 2022-03-18 09:21:50 [+], Adam D. Barratt wrote: > Apologies if the status here got confused - based on the above, I was > assuming that in the absence of a negative response you would proceed > with the 1.1.1n-0+deb11u1 plan. For complete clarity, please feel free > to do so, bearing in mind

Re: Bug#1003484: bullseye-pu: package openssl/1.1.1m-0+deb11u1

2022-03-18 Thread Adam D. Barratt
On Wed, 2022-03-09 at 08:45 +0100, Sebastian Andrzej Siewior wrote: > On 2022-02-19 17:57:25 [+], Adam D. Barratt wrote: > > Feel free to upload; we'll wait for the d-i ack before accepting > > the > > package into p-u. > > There will be the release of 1.1.1n on Tuesday 15th March 2022 > inclu

Re: Bug#1003484: bullseye-pu: package openssl/1.1.1m-0+deb11u1

2022-03-09 Thread Cyril Brulebois
Sebastian Andrzej Siewior (2022-03-09): > On 2022-02-19 17:57:25 [+], Adam D. Barratt wrote: > > Feel free to upload; we'll wait for the d-i ack before accepting the > > package into p-u. > > There will be the release of 1.1.1n on Tuesday 15th March 2022 including > a security fix. Therefore

Re: Bug#1003484: bullseye-pu: package openssl/1.1.1m-0+deb11u1

2022-03-08 Thread Sebastian Andrzej Siewior
On 2022-02-19 17:57:25 [+], Adam D. Barratt wrote: > Feel free to upload; we'll wait for the d-i ack before accepting the > package into p-u. There will be the release of 1.1.1n on Tuesday 15th March 2022 including a security fix. Therefore I will: - prepare a security release against 1.1.1k-1

Re: Bug#1003484: bullseye-pu: package openssl/1.1.1m-0+deb11u1

2022-02-24 Thread Sebastian Andrzej Siewior
On 2022-02-19 17:57:25 [+], Adam D. Barratt wrote: > > Feel free to upload; we'll wait for the d-i ack before accepting the > package into p-u. Okay. The Bullseye package has been uploaded. > Regards, > > Adam Sebastian

Re: Bug#1003484: bullseye-pu: package openssl/1.1.1m-0+deb11u1

2022-02-19 Thread Adam D. Barratt
On Sat, 2022-02-19 at 18:52 +0100, Sebastian Andrzej Siewior wrote: > On 2022-02-19 17:04:16 [+], Adam D. Barratt wrote: > > Control: tags -1 + confirmed d-i > … > > Thanks. Assuming the above is still accurate, then this looks good > > to > > me. > > > > As the package builds a udeb, it will

Re: Bug#1003484: bullseye-pu: package openssl/1.1.1m-0+deb11u1

2022-02-19 Thread Sebastian Andrzej Siewior
On 2022-02-19 17:04:16 [+], Adam D. Barratt wrote: > Control: tags -1 + confirmed d-i … > Thanks. Assuming the above is still accurate, then this looks good to > me. > > As the package builds a udeb, it will need a d-i ack; tagging and CCing > accordingly. I'm confused. May I upload or do I w

Re: Bug#1003484: bullseye-pu: package openssl/1.1.1m-0+deb11u1

2022-02-19 Thread Adam D. Barratt
Control: tags -1 + confirmed d-i On Tue, 2022-01-11 at 00:00 +0100, Sebastian Andrzej Siewior wrote: > This is an update to the latest stable update of the openssl package > provided by upstream. It contains fixes for bugs which were not > identified as security critical but still wor

Re: Bug#959469: buster-pu: package openssl/1.1.1g-1

2021-03-28 Thread Sebastian Andrzej Siewior
On 2021-03-22 19:52:00 [+0100], To Kurt Roeckx wrote: > > I will prepare 1.1.1k for unstable, do buster-security based on > > 1.1.1d-0+deb10u5 and then come back with an updated pu :) New round. I prepared a pu for Buster based on OpenSSL 1.1.1k. The unstable release migrated to testi

Re: Bug#959469: buster-pu: package openssl/1.1.1g-1

2021-03-22 Thread Sebastian Andrzej Siewior
Resending because I managed to accidently clear TO: On 2021-03-22 19:48:31 [+0100], Cc 959...@bugs.debian.org wrote: > On 2021-02-24 23:23:07 [+0100], To Kurt Roeckx wrote: > > On 2021-02-10 21:52:46 [+0100], To Kurt Roeckx wrote: > > > OpenSSL upstream announced [0] 1.1.1j for

Re: Bug#959469: buster-pu: package openssl/1.1.1g-1

2021-03-22 Thread Sebastian Andrzej Siewior
On 2021-02-24 23:23:07 [+0100], To Kurt Roeckx wrote: > On 2021-02-10 21:52:46 [+0100], To Kurt Roeckx wrote: > > OpenSSL upstream announced [0] 1.1.1j for next Tuesday with a security > > fix classified as MODERATE [1]. So this happened. OpenSSL upstream announced [0] 1.1.1k fo

Re: Bug#959469: buster-pu: package openssl/1.1.1g-1

2021-02-10 Thread Sebastian Andrzej Siewior
On 2021-02-01 23:50:03 [+0100], To Kurt Roeckx wrote: > in case someone wants to test. > I think the ship for this pu is sailing without me but I'm ready for the > next cruise :) OpenSSL upstream announced [0] 1.1.1j for next Tuesday with a security fix classified as MODERATE [

Re: Bug#959469: buster-pu: package openssl/1.1.1g-1

2021-02-01 Thread Sebastian Andrzej Siewior
hope this is the end of the regressions in the X509 code. > > > > So there is something else now: > > https://github.com/openssl/openssl/issues/13931 > > https://github.com/openssl/openssl/pull/13982 > > So what is the plan here? Upload to unstable and prepare a pu onc

Re: Bug#959469: buster-pu: package openssl/1.1.1g-1

2021-01-29 Thread Sebastian Andrzej Siewior
is something else now: > https://github.com/openssl/openssl/issues/13931 > https://github.com/openssl/openssl/pull/13982 So what is the plan here? Upload to unstable and prepare a pu once it migrate to testing or right away? > Kurt Sebastian

Re: Bug#959469: buster-pu: package openssl/1.1.1g-1

2021-01-27 Thread Kurt Roeckx
On Thu, Jan 14, 2021 at 07:03:37PM +0100, Kurt Roeckx wrote: > There are a whole bunch of other issues and pull requests related to > this. I hope this is the end of the regressions in the X509 code. So there is something else now: https://github.com/openssl/openssl/issues/13931

Re: Bug#959469: buster-pu: package openssl/1.1.1g-1

2021-01-25 Thread Sebastian Andrzej Siewior
ible acceptance into p-u. in case it helps, I uploaded https://breakpoint.cc/openssl-pu.tar | $ sha512sum openssl-pu.tar | 1a3df2e37aa9312a378046691794bf7d7d72570ed9ade7ffbf50f87c8c8a7dd5e671a7f704fc4f1ebdbada1dda3007a5db24b426deefd33fff39b81e7be38aa3 openssl-pu.tar containing the source

Re: Bug#959469: buster-pu: package openssl/1.1.1g-1

2021-01-25 Thread Cyril Brulebois
Adam D. Barratt (2021-01-25): > KiBi - I'm assuming that it would be much easier for you to check d-i > against the new OpenSSL version if it were already in p-u? Not really *much* easier, to be honest. I can definitely build a package locally given a source debdiff, or slightly bett

Re: Bug#959469: buster-pu: package openssl/1.1.1g-1

2021-01-25 Thread Adam D. Barratt
On Sun, 2021-01-24 at 12:25 +0100, Sebastian Andrzej Siewior wrote: > On 2021-01-22 16:38:28 [+], Adam D. Barratt wrote: > > Both would be good, please. > > Here is the complete diff against the last openssl release in Buster. Thanks. I realise that this has been dragging on

Re: Bug#959469: buster-pu: package openssl/1.1.1g-1

2021-01-24 Thread Sebastian Andrzej Siewior
On 2021-01-22 16:38:28 [+], Adam D. Barratt wrote: > Assuming that a patched m2crypto will also build fine against openssl > 1.1.1d, then there's no reason that the two shouldn't proceed in > parallel (i.e. feel free to file the m2crypto request already). Yes, it does. Bu

Re: Bug#959469: buster-pu: package openssl/1.1.1g-1

2021-01-24 Thread Sebastian Andrzej Siewior
4,9 @@ openssl (1.1.1i-0+deb10u1) buster; urgency=medium - CVE-2019-1551 (Overflow in the x64_64 Montgomery squaring procedure), (Closes: #947949). * Update symbol list. + * Apply two patches from upstream to address x509 related regressions. - -- Sebastian Andrzej Siewior Wed, 06 Jan 2

Re: Bug#959469: buster-pu: package openssl/1.1.1g-1

2021-01-22 Thread Adam D. Barratt
don't know about any other regressions in 1.1.1. > > The openssl package migrated to testing. > I would prepare the pu package for Buster. Should I post here the > complete diff or an incremental containing only the new patches? Both would be good, please. FWIW we're also fig

Re: Bug#959469: buster-pu: package openssl/1.1.1g-1

2021-01-21 Thread Sebastian Andrzej Siewior
On 2021-01-16 19:14:53 [+0100], Kurt Roeckx wrote: > So I went over the open issues and pull requests, and currently > don't see a reason not to upload it to unstable with those 2 > patches. I don't know about any other regressions in 1.1.1. The openssl package migrated

Re: Bug#959469: buster-pu: package openssl/1.1.1g-1

2021-01-16 Thread Kurt Roeckx
On Thu, Jan 14, 2021 at 09:13:49PM +0100, Sebastian Andrzej Siewior wrote: > On 2021-01-14 19:03:37 [+0100], Kurt Roeckx wrote: > > > Do you have pointers to upstream issues? > > > > There are a whole bunch of other issues and pull requests related to > > this. I hope this is the end of the regres

Re: Bug#959469: buster-pu: package openssl/1.1.1g-1

2021-01-14 Thread Sebastian Andrzej Siewior
On 2021-01-14 19:03:37 [+0100], Kurt Roeckx wrote: > > Do you have pointers to upstream issues? > > There are a whole bunch of other issues and pull requests related to > this. I hope this is the end of the regressions in the X509 code. Okay. Please ping once this gets sorted out and I will prepe

Re: Bug#959469: buster-pu: package openssl/1.1.1g-1

2021-01-14 Thread Kurt Roeckx
ssue is a different story and is still open in BTS > > > (#977655). I *think* someone added an override or the ci-system was > > > kind to Kurt/me and looked the other way :) > > > The m2crypto package in stable and bpo will FTBFS with the updated > > > openssl p

Re: Bug#959469: buster-pu: package openssl/1.1.1g-1

2021-01-14 Thread Adam D. Barratt
tem was > > kind to Kurt/me and looked the other way :) > > The m2crypto package in stable and bpo will FTBFS with the updated > > openssl package. > > > > I'm not aware of other issues. > > I think there are at least 2 upstream issues since the 1.1.1i >

Re: Bug#959469: buster-pu: package openssl/1.1.1g-1

2021-01-08 Thread Kurt Roeckx
> The m2crypto package in stable and bpo will FTBFS with the updated > openssl package. > > I'm not aware of other issues. I think there are at least 2 upstream issues since the 1.1.1i release we want to fix first. As far as I know, they haven't been fixed upstream yet. Kurt

Re: Bug#959469: buster-pu: package openssl/1.1.1g-1

2020-11-24 Thread Sebastian Andrzej Siewior
On 2020-11-24 20:18:15 [+], Adam D. Barratt wrote: > That would be preferable at this point, yes, sorry. We should try and > make sure it's sorted soon afterwards though, to avoid things getting > stuck again. I will set up an alarm on my side :) > At some point, could we please have a combin

Re: Bug#959469: buster-pu: package openssl/1.1.1g-1

2020-11-24 Thread Adam D. Barratt
On Fri, 2020-11-20 at 21:04 +0100, Sebastian Andrzej Siewior wrote: > On 2020-11-20 17:24:30 [+], Adam D. Barratt wrote: > > Predictably we're again quite close to a point release. :-( (One > > week from freeze, specifically.) > > oh. In fairness, given an approximately two month cycle, we're

Re: Bug#959469: buster-pu: package openssl/1.1.1g-1

2020-11-20 Thread Sebastian Andrzej Siewior
On 2020-11-20 17:24:30 [+], Adam D. Barratt wrote: > Predictably we're again quite close to a point release. :-( (One week > from freeze, specifically.) oh. > Looking at the upstream issues regarding certificate validation changes > between 1.1.1e and f/g, #11456 appears to have been addresse

Re: Bug#959469: buster-pu: package openssl/1.1.1g-1

2020-11-20 Thread Adam D. Barratt
On Sun, 2020-11-15 at 11:29 +0100, Sebastian Andrzej Siewior wrote: > control: retitle -1 buster-pu: package openssl/1.1.1h-1 > > On 2020-05-02 22:34:40 [+0100], Adam D. Barratt wrote: > > > > Do we have any feeling for how widespread such certificates > > > >

Re: Bug#959469: buster-pu: package openssl/1.1.1g-1

2020-11-15 Thread Sebastian Andrzej Siewior
control: retitle -1 buster-pu: package openssl/1.1.1h-1 On 2020-05-02 22:34:40 [+0100], Adam D. Barratt wrote: > > > Do we have any feeling for how widespread such certificates might > > > be? > > > The fact that there have been two different upstream reports isn'

Re: Bug#959469: buster-pu: package openssl/1.1.1g-1

2020-05-02 Thread Adam D. Barratt
On Sat, 2020-05-02 at 22:29 +0200, Sebastian Andrzej Siewior wrote: > On 2020-05-02 20:32:01 [+0100], Adam D. Barratt wrote: > > On Sat, 2020-05-02 at 18:36 +0200, Sebastian Andrzej Siewior wrote: > > > I'm fairly late, I know. > > > > Just a little. :-( P

Re: buster-pu: package openssl/1.1.1g-1

2020-05-02 Thread Sebastian Andrzej Siewior
On 2020-05-02 20:32:01 [+0100], Adam D. Barratt wrote: > On Sat, 2020-05-02 at 18:36 +0200, Sebastian Andrzej Siewior wrote: > > I'm fairly late, I know. > > Just a little. :-( Particularly as OpenSSL builds udebs. > > CCing KiBi and -boot so they're aware of the d

Re: buster-pu: package openssl/1.1.1g-1

2020-05-02 Thread Adam D. Barratt
On Sat, 2020-05-02 at 18:36 +0200, Sebastian Andrzej Siewior wrote: > I'm fairly late, I know. Just a little. :-( Particularly as OpenSSL builds udebs. CCing KiBi and -boot so they're aware of the discussion, but this does come quite late. > The last update was addressed via DS

Processed: Re: Bug#931760: doesn't pull perl-openssl-defaults in debootstrap

2019-07-16 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 931760 debootstrap Bug #931760 [libnet-ssleay-perl] doesn't pull perl-openssl-defaults in debootstrap Bug reassigned from package 'libnet-ssleay-perl' to 'debootstrap'. No longer marked as found in versio

Re: Bug#927437: unblock: openssl/1.1.1b-2

2019-04-19 Thread Niels Thykier
Cyril Brulebois: > Hi Kurt, > > Kurt Roeckx (2019-04-19): >> Can you please unblock openssl. It fixes 2 important bugs. >> debdiff attached. > > (And thanks for the cc.) > > I have been able to confirm during my work on haveged (#923675) that > your upload

Re: Bug#927437: unblock: openssl/1.1.1b-2

2019-04-19 Thread Cyril Brulebois
Hi Kurt, Kurt Roeckx (2019-04-19): > Can you please unblock openssl. It fixes 2 important bugs. > debdiff attached. (And thanks for the cc.) I have been able to confirm during my work on haveged (#923675) that your upload indeed fixes the wget issues we had in d-i (#926315); so thanks al

Bug#927437: unblock: openssl/1.1.1b-2

2019-04-19 Thread Kurt Roeckx
Package: release.debian.org User: release.debian@packages.debian.org Usertags: unblock Hi, Can you please unblock openssl. It fixes 2 important bugs. debdiff attached. Kurt diff -Nru openssl-1.1.1b/debian/changelog openssl-1.1.1b/debian/changelog --- openssl-1.1.1b/debian/changelog

Re: [Pkg-openssl-devel] Bug#926315: openssl: wget https://google.com fails in d-i

2019-04-05 Thread Dimitri John Ledkov
On Wed, 3 Apr 2019 at 22:57, Kurt Roeckx wrote: > > On Wed, Apr 03, 2019 at 11:23:19PM +0200, Cyril Brulebois wrote: > > 1726 write(2, "Disabling SSL due to encountered errors.\n", 41) = 41 > > Looking at the source, about the only reason I can see to get that > is that SSL_CTX_new() failed.

Re: [Pkg-openssl-devel] Bug#926315: Bug#926315: Bug#926315: openssl: wget https://google.com fails in d-i

2019-04-03 Thread Kurt Roeckx
n more configurable. > > However, the behavior of OPENSSL_config() was lost in the process, > > having it suddenly generate errors it didn't previously, which is not > > how it's documented to behave. > > > > A simple setting of de

Re: [Pkg-openssl-devel] Bug#926315: Bug#926315: Bug#926315: openssl: wget https://google.com fails in d-i

2019-04-03 Thread Cyril Brulebois
how it's documented to behave. > > A simple setting of default flags fixes this problem. > > Fixes #8528 > > Reviewed-by: Matt Caswell > (Merged from https://github.com/openssl/openssl/pull/8533) > > (cherry picked from commit 905c9a72a7087015

Re: [Pkg-openssl-devel] Bug#926315: Bug#926315: Bug#926315: openssl: wget https://google.com fails in d-i

2019-04-03 Thread Kurt Roeckx
g() was lost in the process, having it suddenly generate errors it didn't previously, which is not how it's documented to behave. A simple setting of default flags fixes this problem. Fixes #8528 Reviewed-by: Matt Caswell (Merged from https:/

Re: [Pkg-openssl-devel] Bug#926315: Bug#926315: openssl: wget https://google.com fails in d-i

2019-04-03 Thread Kurt Roeckx
On Wed, Apr 03, 2019 at 11:57:12PM +0200, Kurt Roeckx wrote: > On Wed, Apr 03, 2019 at 11:23:19PM +0200, Cyril Brulebois wrote: > > 1726 write(2, "Disabling SSL due to encountered errors.\n", 41) = 41 > > wget in buster actually seems to be linked to gnutls, and trying > other applications ju

Re: [Pkg-openssl-devel] Bug#926315: openssl: wget https://google.com fails in d-i

2019-04-03 Thread Kurt Roeckx
FIG if the options already include OPENSSL_INIT_NO_LOAD_CONFIG. 4. Don't set up atexit() handlers when called with opts equal to OPENSSL_INIT_BASE_ONLY (this flag should only be used alone). Reviewed-by: Bernd Edlinger Reviewed-by: Matt Caswell (Merged from htt

Re: [Pkg-openssl-devel] Bug#926315: openssl: wget https://google.com fails in d-i

2019-04-03 Thread Cyril Brulebois
Hi again, Cyril Brulebois (2019-04-03): > I'm pretty sure we had successes with wget/https within d-i not so long > ago (i.e. during the last BSP at Mozilla's, past week), and there were no > changes on the openssl side in the meanwhile. Or maybe my explicit testing didn&#x

Re: [Pkg-openssl-devel] Bug#926315: openssl: wget https://google.com fails in d-i

2019-04-03 Thread Cyril Brulebois
> > > fails in Buster alpha installer, when used from a booted netinst iso > > > in a tty. It also means that fetch-url fails, and thus one cannot use > > > https preseeding. > > > > > > A fix/workaround, is $ touch /usr/lib/ssl/openssl.cnf it appears tha

Bug#895074: marked as done (debian-installer: Please replace 'c_rehash' with 'openssl rehash')

2018-06-10 Thread Debian Bug Tracking System
Your message dated Sun, 10 Jun 2018 22:04:54 + with message-id and subject line Bug#895074: fixed in debian-installer 20180610 has caused the Debian Bug report #895074, regarding debian-installer: Please replace 'c_rehash' with 'openssl rehash' to be marked as done. This

Bug#895074: debian-installer: Please replace 'c_rehash' with 'openssl rehash'

2018-04-07 Thread Cyril Brulebois
Control: tag -1 patch pending Hi Sebastian, Sebastian Andrzej Siewior (2018-04-07): > Source: debian-installer > Version: 20171204 > Severity: normal > Tags: sid buster > User: pkg-openssl-de...@lists.alioth.debian.org > Usertags: c_rehash > > This package is using th

Processed: Re: Bug#895074: debian-installer: Please replace 'c_rehash' with 'openssl rehash'

2018-04-07 Thread Debian Bug Tracking System
Processing control commands: > tag -1 patch pending Bug #895074 [src:debian-installer] debian-installer: Please replace 'c_rehash' with 'openssl rehash' Added tag(s) pending and patch. -- 895074: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895074 Debian Bug Tra

Bug#895074: debian-installer: Please replace 'c_rehash' with 'openssl rehash'

2018-04-06 Thread Sebastian Andrzej Siewior
Source: debian-installer Version: 20171204 Severity: normal Tags: sid buster User: pkg-openssl-de...@lists.alioth.debian.org Usertags: c_rehash This package is using the c_rehash command which is part of the openssl package. The c_rehash script is considered by upstream as a fallback script and

Re: Bug#855432: unblock: openssl/1.1.0e-1

2017-03-04 Thread Niels Thykier
Cyril Brulebois: > Cyril Brulebois (2017-02-21): >> I think that should work, yes. Please let me know when that's happened, >> and I'll do the testing as soon as possible. > > This has happened, and building a netboot-gtk image with stretch udebs > and with p-u enabled got me a 1.18-4.1 version o

Re: Bug#855432: unblock: openssl/1.1.0e-1

2017-02-28 Thread Cyril Brulebois
Cyril Brulebois (2017-02-21): > I think that should work, yes. Please let me know when that's happened, > and I'll do the testing as soon as possible. This has happened, and building a netboot-gtk image with stretch udebs and with p-u enabled got me a 1.18-4.1 version of the wget-udeb package, wi

Re: Bug#855432: unblock: openssl/1.1.0e-1

2017-02-20 Thread Cyril Brulebois
Niels Thykier (2017-02-20): > I did and I agree on the testing part. Would a "no-change rebuild" tpu > upload of wget be a solution for you? That should ensure we control > when the wget change migrates to testing (which is somewhat more > difficult with binNMUs). I think that should work, yes.

Re: Bug#855432: unblock: openssl/1.1.0e-1

2017-02-19 Thread Niels Thykier
Cyril Brulebois: > Niels Thykier (2017-02-19): >> [...] > > Hrm. You mentioned on IRC you were pondering possibly rebuilding wget > against 1.1 for stretch; if that happens, this needs d-i testing… > > > KiBi. > I did and I agree on the testing part. Would a "no-change rebuild" tpu upload of

Re: Bug#855432: unblock: openssl/1.1.0e-1

2017-02-19 Thread Cyril Brulebois
Niels Thykier (2017-02-19): > Cyril Brulebois: > > We have this right now: > > > > wget-udeb | 1.18-4| testing → built against 1.0.2 > > wget-udeb | 1.19.1-1 | unstable → built against 1.1 > > > > If we're not getting a newer wget for stretch (at least I didn't find > > a

Re: Bug#855432: unblock: openssl/1.1.0e-1

2017-02-19 Thread Niels Thykier
Cyril Brulebois: > Kurt Roeckx (2017-02-18): >> On Sat, Feb 18, 2017 at 06:16:28PM +0100, Cyril Brulebois wrote: >>> How soon do you want to see this package in testing? Given I've just >>> fixed a few things related to https support in d-i, it would be nice if >>> I were able to perform a full te

Re: Bug#855432: unblock: openssl/1.1.0e-1

2017-02-19 Thread Kurt Roeckx
On Sun, Feb 19, 2017 at 07:33:20AM +0100, Cyril Brulebois wrote: > Kurt Roeckx (2017-02-18): > > On Sat, Feb 18, 2017 at 06:16:28PM +0100, Cyril Brulebois wrote: > > > How soon do you want to see this package in testing? Given I've just > > > fixed a few things related to https support in d-i, it

Re: Bug#855432: unblock: openssl/1.1.0e-1

2017-02-18 Thread Cyril Brulebois
Kurt Roeckx (2017-02-18): > On Sat, Feb 18, 2017 at 06:16:28PM +0100, Cyril Brulebois wrote: > > How soon do you want to see this package in testing? Given I've just > > fixed a few things related to https support in d-i, it would be nice if > > I were able to perform a full test with https here,

Bug#855432: unblock: openssl/1.1.0e-1

2017-02-17 Thread Kurt Roeckx
Package: release.debian.org User: release.debian@packages.debian.org Usertags: unblock Severity: normal Hi, There was a new upstream release fixing a high severity security issue. The changelog entry is: openssl (1.1.0e-1) unstable; urgency=high * New upstream version - Fixes CVE

Re: Bug#854155: unblock: openssl/1.1.0d-2

2017-02-13 Thread Emilio Pozuelo Monfort
ertags: unblock >>> Severity: normal >>> >>> Please unblock package openssl. It contains a redo of the rules file >>> among other packaging related changes which did not migrate in time due >>> to the new release of the d version which fixes 3 CVE bug

Re: Bug#854155: unblock: openssl/1.1.0d-2

2017-02-13 Thread Sebastian Andrzej Siewior
On 2017-02-13 18:01:34 [+0100], Emilio Pozuelo Monfort wrote: > On 04/02/17 15:20, Sebastian Andrzej Siewior wrote: > > Package: release.debian.org > > User: release.debian@packages.debian.org > > Usertags: unblock > > Severity: normal > > > > Please

Re: Bug#854155: unblock: openssl/1.1.0d-2

2017-02-13 Thread Cyril Brulebois
Hi, Emilio Pozuelo Monfort (2017-02-13): > On 04/02/17 15:20, Sebastian Andrzej Siewior wrote: > > Please unblock package openssl. It contains a redo of the rules file > > among other packaging related changes which did not migrate in time > > due to the new release of the

Re: Bug#854155: unblock: openssl/1.1.0d-2

2017-02-13 Thread Emilio Pozuelo Monfort
On 04/02/17 15:20, Sebastian Andrzej Siewior wrote: > Package: release.debian.org > User: release.debian@packages.debian.org > Usertags: unblock > Severity: normal > > Please unblock package openssl. It contains a redo of the rules file > among other packaging related

Re: [Pkg-openssl-devel] Bug#827951: libssl udeb inclusion in Jessie

2016-08-03 Thread Sebastian Andrzej Siewior
On 2016-06-24 10:35:43 [+0200], Yann Soubeyrand wrote: > Le jeudi 23 juin 2016 à 23:13 +0200, jcris...@debian.org a écrit : > > That doesn't sound suitable for a stable update, sorry. > OK, I understand. Closing with no change then. Sebastian

Re: [Pkg-openssl-devel] Bug#827951: libssl udeb inclusion in Jessie

2016-06-24 Thread Yann Soubeyrand
Le jeudi 23 juin 2016 à 23:13 +0200, jcris...@debian.org a écrit : > On Thu, Jun 23, 2016 at 12:55:54 +0200, Yann Soubeyrand wrote: > > > Le jeudi 23 juin 2016 à 11:20 +0200, k...@roeckx.be a écrit : > > > On Thu, Jun 23, 2016 at 10:58:54AM +0200, Yann Soubeyrand wrote: >

Re: [Pkg-openssl-devel] Bug#827951: libssl udeb inclusion in Jessie

2016-06-23 Thread Julien Cristau
On Thu, Jun 23, 2016 at 12:55:54 +0200, Yann Soubeyrand wrote: > Le jeudi 23 juin 2016 à 11:20 +0200, k...@roeckx.be a écrit : > > On Thu, Jun 23, 2016 at 10:58:54AM +0200, Yann Soubeyrand wrote: > > > Package: openssl > > > Severity: normal > > > Version

Re: [Pkg-openssl-devel] Bug#827951: libssl udeb inclusion in Jessie

2016-06-23 Thread Yann Soubeyrand
Le jeudi 23 juin 2016 à 11:20 +0200, k...@roeckx.be a écrit : > On Thu, Jun 23, 2016 at 10:58:54AM +0200, Yann Soubeyrand wrote: > > Package: openssl > > Severity: normal > > Version: 1.0.1t-1+deb8u2 > > X-Debbugs-CC: debian-rele...@lists.debian.org > > X-Debbugs

Re: [Pkg-openssl-devel] Bug#827951: libssl udeb inclusion in Jessie

2016-06-23 Thread Kurt Roeckx
On Thu, Jun 23, 2016 at 10:58:54AM +0200, Yann Soubeyrand wrote: > Package: openssl > Severity: normal > Version: 1.0.1t-1+deb8u2 > X-Debbugs-CC: debian-rele...@lists.debian.org > X-Debbugs-CC: debian-boot@lists.debian.org > > Hi, > > Marga Manterola provided a patc

Re: [Pkg-openssl-devel] Bug#802591: Please provide libssl udeb as well as the libcrypto udeb

2016-03-18 Thread Josh Triplett
Any update on this bug? I'm quite interested in seeing debian-installer https preseeding support in stretch, and this bug is the first step towards that. - Josh Triplett

Re: [Pkg-openssl-devel] Bug#802591: Please provide libssl udeb as well as the libcrypto udeb

2015-10-24 Thread Kurt Roeckx
On Wed, Oct 21, 2015 at 01:10:07PM +, Marga Manterola wrote: > I've noticed that experimental has a soversion bump for openssl, so I > created this patch against the version in unstable. If you want me to > create the patch against the version in experimental, please let me kno

Bug#780902: unblock: openssl/1.0.1k-2

2015-03-21 Thread Kurt Roeckx
Package: release.debian.org Severity: normal User: release.debian@packages.debian.org Usertags: unblock Hi, 1.0.1k-2 contains security fixes. Could you please unblock it? Kurt -- To UNSUBSCRIBE, email to debian-boot-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Cont

Re: Bug#775025: unblock: openssl/1.0.1k-1

2015-01-25 Thread Niels Thykier
On 2015-01-25 22:16, Cyril Brulebois wrote: > Control: tag -1 confirmed > > Kurt Roeckx (2015-01-20): >> Can you ACK that, or is there someone else in the d-i team that >> can do that? > > Not at the time this unblock was requested or pinged, but right now: > yes. > > Mraw, > KiBi. > Added -u

Re: Bug#775025: unblock: openssl/1.0.1k-1

2015-01-25 Thread Cyril Brulebois
Control: tag -1 confirmed Kurt Roeckx (2015-01-20): > Can you ACK that, or is there someone else in the d-i team that > can do that? Not at the time this unblock was requested or pinged, but right now: yes. Mraw, KiBi. signature.asc Description: Digital signature

Re: Bug#775025: unblock: openssl/1.0.1k-1

2015-01-20 Thread Kurt Roeckx
; > User: release.debian@packages.debian.org > > Usertags: unblock > > > > Hi, > > > > I've uploaded a new upstream version of openssl to unstable. This > > contains fixes for 7 security issues affecting jessie. It also > > contains a lot

Re: Openssl

2009-06-23 Thread Neil McGovern
On Fri, Jun 19, 2009 at 12:43:36AM +0200, Kurt Roeckx wrote: > Can openssl 0.9.8k-3 be pushed to testing? It fixed a number > of security issues. > Unblocked. Neil -- A. Because it breaks the logical sequence of discussion Q. Why is top posting bad? gpg key - http://www.hal

Openssl

2009-06-18 Thread Kurt Roeckx
Hi, Can openssl 0.9.8k-3 be pushed to testing? It fixed a number of security issues. Kurt -- To UNSUBSCRIBE, email to debian-boot-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Re: Unblock openssl

2009-04-07 Thread Luk Claes
Kurt Roeckx wrote: > Hi, > > Can openssl 0.9.8g-16 be hinted to testing? > > It fixes a security issue. > > It has a udeb. unblocked Cheers Luk -- To UNSUBSCRIBE, email to debian-boot-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Unblock openssl

2009-04-06 Thread Kurt Roeckx
Hi, Can openssl 0.9.8g-16 be hinted to testing? It fixes a security issue. It has a udeb. Kurt -- To UNSUBSCRIBE, email to debian-boot-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Re: openssl 0.9.8g-14

2008-11-10 Thread Otavio Salvador
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Kurt Roeckx <[EMAIL PROTECTED]> writes: > Hi, > > Could you please hint openssl in testing? The changelog: >* Don't give the warning about security updates when upgrading > from etch since it doesn't h

Re: openssl 0.9.8g-14

2008-11-10 Thread Luk Claes
Otavio Salvador wrote: > Kurt Roeckx <[EMAIL PROTECTED]> writes: > >> Hi, > >> Could you please hint openssl in testing? The changelog: >>* Don't give the warning about security updates when upgrading >> from etch since it doesn't have

openssl 0.9.8g-14

2008-11-03 Thread Kurt Roeckx
Hi, Could you please hint openssl in testing? The changelog: * Don't give the warning about security updates when upgrading from etch since it doesn't have any known security problems. * Automaticly use engines that succesfully initialised. Patch from the 0.9.8h upstre

Re: [Pkg-openssl-devel] Bug#492758: openssl: OpenSSL generates errors with Firefox 3

2008-08-12 Thread Otavio Salvador
Claes wrote: >> >> Kurt Roeckx wrote: >> >> > Hi, >> >> > >> >> > I would like to fix this for lenny. Would such a patch be acceptable? >> >> >> >> Yes. >> > >> > Can that change be hinted to testing? >&g

Re: [Pkg-openssl-devel] Bug#492758: openssl: OpenSSL generates errors with Firefox 3

2008-08-11 Thread Kurt Roeckx
d like to fix this for lenny. Would such a patch be acceptable? > >> > >> Yes. > > > > Can that change be hinted to testing? > > Could you paste the changelog? openssl (0.9.8g-13) unstable; urgency=low . * Fix a problem with tlsext preventing firefox 3 from

Re: [Pkg-openssl-devel] Bug#492758: openssl: OpenSSL generates errors with Firefox 3

2008-08-11 Thread Otavio Salvador
Kurt Roeckx <[EMAIL PROTECTED]> writes: > On Sat, Aug 02, 2008 at 10:41:13PM +0200, Luk Claes wrote: >> Kurt Roeckx wrote: >> > Hi, >> > >> > I would like to fix this for lenny. Would such a patch be acceptable? >> >> Yes. > > Can that change be hinted to testing? Could you paste the changelog

Re: [Pkg-openssl-devel] Bug#492758: openssl: OpenSSL generates errors with Firefox 3

2008-08-11 Thread Kurt Roeckx
t; > On Mon, Jul 28, 2008 at 11:21:49AM -0600, Soren Stoutner wrote: > >> Package: openssl > >> Version: 0.9.8g-12 > >> Severity: important > >> > >> > >> There is a bug in the currently packaged version of OpenSSL that generates > >

Re: openssl 0.9.8g-9

2008-05-11 Thread Adeodato Simó
* Kurt Roeckx [Wed, 07 May 2008 21:09:15 +0200]: > I've just uploaded openssl 0.9.8g-9 which contains an important security > fix. Please let it migrate to testing. This has been unblocked by aba after ack from D-I team. Cheers, -- Adeodato Simó

openssl 0.9.8g-9

2008-05-07 Thread Kurt Roeckx
Hi, I've just uploaded openssl 0.9.8g-9 which contains an important security fix. Please let it migrate to testing. Kurt -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: hint openssl 0.9.8g-8 in testing

2008-03-25 Thread Philipp Kern
Kurt, am Tue, Mar 25, 2008 at 06:40:42PM +0100 hast du folgendes geschrieben: > Could you please hint openssl 0.9.8g-8 in testing? unblocked. Will go in as soon as the hppa build is installed. Cheers, Philipp Kern -- .''`. Philipp Kern Deb

Re: hint openssl 0.9.8g-8 in testing

2008-03-25 Thread Otavio Salvador
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Kurt Roeckx <[EMAIL PROTECTED]> writes: > Hi, > > Could you please hint openssl 0.9.8g-8 in testing? Ack! - -- O T A V I OS A L V A D O R - - E-mail: [EMAIL PROTECTED] UI

hint openssl 0.9.8g-8 in testing

2008-03-25 Thread Kurt Roeckx
Hi, Could you please hint openssl 0.9.8g-8 in testing? Kurt -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

  1   2   >