On 2022-03-05 16:34:29 [-0800], Anders Kaseorg wrote:
> Any progress on this fix, via either my targeted debdiff or a full update to
> ≥ 1.1.1i?
There will be an openssl security release on Tuesday 15th March 2022. I
intend to a fix to this as part of the security update.
> Anders
Sebastian
On 1/26/22 11:56, Sebastian Andrzej Siewior wrote:
On 2022-01-25 22:10:00 [-0500], Anders Kaseorg wrote:
The fix is trivial, swapping two lines of assembly. I’ve attached it as a
debdiff, and tested it in a Debian 10 container on an M1 MacBook. Can it
be considered for oldstable?
Yes. My
On 2022-01-25 22:10:00 [-0500], Anders Kaseorg wrote:
> Control: fixed 989604 1.1.1i-1
> Control: tags 989604 + buster patch
Thanks.
> The fix is trivial, swapping two lines of assembly. I’ve attached it as a
> debdiff, and tested it in a Debian 10 container on an M1 MacBook. Can it
> be
Control: fixed 989604 1.1.1i-1
Control: tags 989604 + buster patch
This crash was introduced by OpenSSL_1_1_1b~37:
https://github.com/openssl/openssl/commit/2cf7fd698ec1375421f91338ff8a44e7da5238b6
and fixed by OpenSSL_1_1_1i~21:
Package: libssl1.1
Version: 1.1.1d-0+deb10u6
Severity: normal
Dear Maintainer,
This bug appears to be fixed by 1.1.1k-1 in testing. I couldn't spot it
in the issue tracker but thought I'd mention it just in case.
On my arm64 machine (Apple M1) if I run Debian buster (in a Linux container
inside
5 matches
Mail list logo