Hi,
Paul Gevers (2023-05-31):
> Can you have a look at this onblock request? It's blocked on your
> block-udeb.
Sorry for the delay; finally run some checks combining openssl and
libselinux binaries, everything looks good.
unblock-udeb in place, leaving monitoring and closing up to you.
Processing control commands:
> tags -1 d-i
Bug #1036957 [release.debian.org] unblock: openssl/3.0.9-1
Added tag(s) d-i.
--
1036957: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036957
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 d-i
Hi kibi,
Can you have a look at this onblock request? It's blocked on your
block-udeb.
Paul
On 30-05-2023 22:52, Sebastian Andrzej Siewior wrote:
control: retitle -1 unblock: openssl/3.0.9-1
On 2023-05-30 22:16:53 [+0200], To sub...@bugs.debian.org wrote:
Please
Processing control commands:
> retitle -1 unblock: openssl/3.0.9-1
Bug #1036957 [release.debian.org] unblock: openssl/3.0.8-1
Changed Bug title to 'unblock: openssl/3.0.9-1' from 'unblock: openssl/3.0.8-1'.
--
1036957: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036957
Debian
control: retitle -1 unblock: openssl/3.0.9-1
On 2023-05-30 22:16:53 [+0200], To sub...@bugs.debian.org wrote:
>
> Please unblock package openssl.
>
> The 3.0.9 release contains security and non-security related fixes for
> the package. There are five new CVEs in total that has
Processing control commands:
> affects -1 + src:openssl
Bug #1036957 [release.debian.org] unblock: openssl/3.0.8-1
Added indication that 1036957 affects src:openssl
--
1036957: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036957
Debian Bug Tracking System
Contact ow...@bugs.debian.
Your message dated Sat, 15 Jun 2019 10:20:48 +0200
with message-id <4faa6749-5eda-516d-e906-7e7de9129...@debian.org>
and subject line Re: Bug#930194: unblock: openssl/1.1.1c-1
has caused the Debian Bug report #930194,
regarding unblock: openssl/1.1.1c-1
to be marked as done.
This means th
Processing control commands:
> tags -1 d-i
Bug #930194 [release.debian.org] unblock: openssl/1.1.1c-1
Added tag(s) d-i.
--
930194: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930194
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 d-i
Hi Sebastian,
On 08-06-2019 21:39, Paul Gevers wrote:
> Control: tags -1 moreinfo confirmed
>
> On 08-06-2019 10:50, Sebastian Andrzej Siewior wrote:
>>> Even if we were to unblock, can we get the m2crypto fix available, such
>>> that they can migrate together? I understood
Control: tags -1 moreinfo confirmed
On 08-06-2019 10:50, Sebastian Andrzej Siewior wrote:
>> Even if we were to unblock, can we get the m2crypto fix available, such
>> that they can migrate together? I understood (last time I checked that
>> bug) that this may just be a test fix?
>
> I believe
Processing control commands:
> tags -1 moreinfo confirmed
Bug #930194 [release.debian.org] unblock: openssl/1.1.1c-1
Added tag(s) confirmed and moreinfo.
--
930194: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930194
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
On 2019-06-08 10:22:54 [+0200], Paul Gevers wrote:
> Control: tags -1 moreinfo
>
> Hi Sebastian,
Hi Paul,
> Can you please elaborate why this version meets the freeze policy, or
> why it should get an exception? In the text above there is no mention at
> all of serious bugs that get fixed.
Processing control commands:
> tags -1 moreinfo
Bug #930194 [release.debian.org] unblock: openssl/1.1.1c-1
Added tag(s) moreinfo.
--
930194: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930194
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
cherry-pick the patch right away.
>
> unblock openssl/1.1.1c-1
Can you please elaborate why this version meets the freeze policy, or
why it should get an exception? In the text above there is no mention at
all of serious bugs that get fixed. openssl is a rather important
package and we
.
unblock openssl/1.1.1c-1
Sebastian
Your message dated Sat, 20 Apr 2019 06:16:00 +
with message-id
and subject line Re: Bug#927437: unblock: openssl/1.1.1b-2
has caused the Debian Bug report #927437,
regarding unblock: openssl/1.1.1b-2
to be marked as done.
This means that you claim that the problem has been dealt
Hi Kurt,
Kurt Roeckx (2019-04-19):
> Can you please unblock openssl. It fixes 2 important bugs.
> debdiff attached.
(And thanks for the cc.)
I have been able to confirm during my work on haveged (#923675) that
your upload indeed fixes the wget issues we had in d-i (#926315); so
thank
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: unblock
Hi,
Can you please unblock openssl. It fixes 2 important bugs.
debdiff attached.
Kurt
diff -Nru openssl-1.1.1b/debian/changelog openssl-1.1.1b/debian/changelog
--- openssl-1.1.1b/debian/changelog
Your message dated Mon, 05 Jun 2017 11:40:00 +
with message-id <fd888d14-c92a-9eb7-e061-8fd3eac8f...@thykier.net>
and subject line Re: Bug#863472: unblock: openssl/1.1.0f-1
has caused the Debian Bug report #863472,
regarding unblock: openssl/1.1.0f-1
to be marked as done.
This means th
Kurt Roeckx (2017-06-05):
> On Mon, Jun 05, 2017 at 11:33:57AM +0200, Cyril Brulebois wrote:
> > Kurt Roeckx (2017-06-04):
> > > So I've uploaded openssl 1.1.0f-2
> >
> > Source debdiff lgtm from -1, and installation over https works fine,
> > ACK.
>
> So I
Kurt Roeckx (2017-06-05):
> On Mon, Jun 05, 2017 at 11:33:57AM +0200, Cyril Brulebois wrote:
> > Kurt Roeckx (2017-06-04):
> > > So I've uploaded openssl 1.1.0f-2
> >
> > Source debdiff lgtm from -1, and installation over https works fine,
> > ACK.
>
> So I
On Mon, Jun 05, 2017 at 11:33:57AM +0200, Cyril Brulebois wrote:
> Kurt Roeckx (2017-06-04):
> > So I've uploaded openssl 1.1.0f-2
>
> Source debdiff lgtm from -1, and installation over https works fine,
> ACK.
So I actually have a new version I want to upload:
Modified:
Kurt Roeckx (2017-06-04):
> So I've uploaded openssl 1.1.0f-2
Source debdiff lgtm from -1, and installation over https works fine,
ACK.
> and openssl1.0 1.0.2l-2
Bare metal check with WPA is next on my todo list.
KiBi.
signature.asc
Description: Digital signature
On Sun, Jun 04, 2017 at 06:53:29PM +0200, Cyril Brulebois wrote:
> Kurt Roeckx (2017-06-04):
> > So I changed it this instead:
> > dh_makeshlibs -a -V --add-udeb="libcrypto1.1-udeb" -Xengines
> >
> > the shlib files now looks like:
> > libcrypto 1.1 libssl1.1 (>= 1.1.0f)
> >
Kurt Roeckx (2017-06-04):
> So I changed it this instead:
> dh_makeshlibs -a -V --add-udeb="libcrypto1.1-udeb" -Xengines
>
> the shlib files now looks like:
> libcrypto 1.1 libssl1.1 (>= 1.1.0f)
> libssl 1.1 libssl1.1 (>= 1.1.0f)
> udeb: libcrypto 1.1 libcrypto1.1-udeb (>=
On Sun, Jun 04, 2017 at 11:09:00AM +, Niels Thykier wrote:
> Kurt Roeckx:
> > [...]
> >>
> >> Maybe file this as an RC bug against openssl so that it isn't forgotten
> >> about, but ignore it for r0?
> >
> > So I have prepared an update. Should I upload it?
> >
> > [...]
> >
> >
> > Kurt
>
Kurt Roeckx:
> [...]
>>
>> Maybe file this as an RC bug against openssl so that it isn't forgotten
>> about, but ignore it for r0?
>
> So I have prepared an update. Should I upload it?
>
> [...]
>
>
> Kurt
>
Ack from here, so if KiBi is ok with it, then please go ahead.
Thanks,
~Niels
On Sun, Jun 04, 2017 at 05:29:21AM +0200, Cyril Brulebois wrote:
> Niels Thykier (2017-06-03):
> > Kurt Roeckx:
> > > Package: release.debian.org
> > > User: release.debian@packages.debian.org
> > > Usertags: unblock
> > > Severity: normal
> > >
> > > Hi,
> > >
> > > I've
Niels Thykier (2017-06-03):
> Kurt Roeckx:
> > Package: release.debian.org
> > User: release.debian@packages.debian.org
> > Usertags: unblock
> > Severity: normal
> >
> > Hi,
> >
> > I've uploaded a new upstream version of openssl that contains bug
> > fixes. The Debian
Kurt Roeckx:
> Package: release.debian.org
> User: release.debian@packages.debian.org
> Usertags: unblock
> Severity: normal
>
> Hi,
>
> I've uploaded a new upstream version of openssl that contains bug
> fixes. The Debian changelog says:
>* New upstream version
> - Fix regression
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: unblock
Severity: normal
Hi,
I've uploaded a new upstream version of openssl that contains bug
fixes. The Debian changelog says:
* New upstream version
- Fix regression in req -x509 (Closes: #839575)
Your message dated Sat, 20 May 2017 05:54:00 +
with message-id <b254c1b9-8e9a-4c80-048d-189bf2e63...@thykier.net>
and subject line Re: Bug#861686: unblock: openssl/1.1.0e-2
has caused the Debian Bug report #861686,
regarding unblock: openssl/1.1.0e-2
to be marked as done.
This means th
Sebastian Andrzej Siewior (2017-05-18):
> On 2017-05-07 16:39:00 [+], Niels Thykier wrote:
> > Sebastian Andrzej Siewior:
> > > uploaded and built on all releases architectures.
> >
> > Ack/RT unblock, CC'ing KiBi for a d-i ack.
>
> I don't want to rush or anything
On 2017-05-07 16:39:00 [+], Niels Thykier wrote:
> Sebastian Andrzej Siewior:
> > uploaded and built on all releases architectures.
>
> Ack/RT unblock, CC'ing KiBi for a d-i ack.
I don't want to rush or anything but in case it got forgotten, we are
still waiting for the d-i ack.
> Thanks,
>
Sebastian Andrzej Siewior:
> Control: tag -1 - moreinfo
>
> On 2017-05-02 20:24:19 [+0100], Jonathan Wiltshire wrote:
>>
>> Yes, please go ahead and remove the moreinfo tag when it is ready to
>> unblock.
>
> uploaded and built on all releases architectures.
>
> Sebastian
>
Ack/RT unblock,
Control: tag -1 - moreinfo
On 2017-05-02 20:24:19 [+0100], Jonathan Wiltshire wrote:
>
> Yes, please go ahead and remove the moreinfo tag when it is ready to
> unblock.
uploaded and built on all releases architectures.
Sebastian
Processing control commands:
> tag -1 - moreinfo
Bug #861686 [release.debian.org] unblock: openssl/1.1.0e-2
Removed tag(s) moreinfo.
--
861686: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861686
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Processing control commands:
> tag -1 confirmed moreinfo
Bug #861686 [release.debian.org] unblock: openssl/1.1.0e-2
Added tag(s) moreinfo and confirmed.
--
861686: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861686
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tag -1 confirmed moreinfo
On Tue, May 02, 2017 at 08:08:15PM +0200, Sebastian Andrzej Siewior wrote:
> I prepared an update to the openssl about which I seek your guidance
> whether it is approriate for Stretch or not.
Yes, please go ahead and remove the moreinfo tag when it is ready to
mething we never had and it is
misc because upstream puts it there. We don't want to add this
dependency to the packet (especially at this point in the cycle). For
post-Stretch we will decide how we handle it.
unblock openssl/1.1.0e-2
Sebastian
diff -Nru openssl-1.1.0e/debian/changelog openssl-1.1
Cyril Brulebois (2017-02-21):
> I think that should work, yes. Please let me know when that's happened,
> and I'll do the testing as soon as possible.
This has happened, and building a netboot-gtk image with stretch udebs
and with p-u enabled got me a 1.18-4.1 version of the
Niels Thykier (2017-02-20):
> I did and I agree on the testing part. Would a "no-change rebuild" tpu
> upload of wget be a solution for you? That should ensure we control
> when the wget change migrates to testing (which is somewhat more
> difficult with binNMUs).
I think
Cyril Brulebois:
> Niels Thykier (2017-02-19):
>> [...]
>
> Hrm. You mentioned on IRC you were pondering possibly rebuilding wget
> against 1.1 for stretch; if that happens, this needs d-i testing…
>
>
> KiBi.
>
I did and I agree on the testing part. Would a "no-change
Niels Thykier (2017-02-19):
> Cyril Brulebois:
> > We have this right now:
> >
> > wget-udeb | 1.18-4| testing → built against 1.0.2
> > wget-udeb | 1.19.1-1 | unstable → built against 1.1
> >
> > If we're not getting a newer wget for stretch (at least
Your message dated Sun, 19 Feb 2017 20:32:00 +
with message-id <b4cb3278-1d8b-732a-83b4-c68bb9a6b...@thykier.net>
and subject line Re: Bug#855432: unblock: openssl/1.1.0e-1
has caused the Debian Bug report #855432,
regarding unblock: openssl/1.1.0e-1
to be marked as done.
This means th
On Sun, Feb 19, 2017 at 07:33:20AM +0100, Cyril Brulebois wrote:
> Kurt Roeckx (2017-02-18):
> > On Sat, Feb 18, 2017 at 06:16:28PM +0100, Cyril Brulebois wrote:
> > > How soon do you want to see this package in testing? Given I've just
> > > fixed a few things related to https
Kurt Roeckx (2017-02-18):
> On Sat, Feb 18, 2017 at 06:16:28PM +0100, Cyril Brulebois wrote:
> > How soon do you want to see this package in testing? Given I've just
> > fixed a few things related to https support in d-i, it would be nice if
> > I were able to perform a full test
On Sat, Feb 18, 2017 at 06:16:28PM +0100, Cyril Brulebois wrote:
> Hi,
>
> Niels Thykier (2017-02-18):
> > Kurt Roeckx:
> > > Package: release.debian.org
> > > User: release.debian@packages.debian.org
> > > Usertags: unblock
> > > Severity: normal
> > >
> > > Hi,
> > >
>
Hi,
Niels Thykier (2017-02-18):
> Kurt Roeckx:
> > Package: release.debian.org
> > User: release.debian@packages.debian.org
> > Usertags: unblock
> > Severity: normal
> >
> > Hi,
> >
> > There was a new upstream release fixing a high severity security
> > issue.
> >
> >
Kurt Roeckx:
> Package: release.debian.org
> User: release.debian@packages.debian.org
> Usertags: unblock
> Severity: normal
>
> Hi,
>
> There was a new upstream release fixing a high severity security
> issue.
>
> The changelog entry is:
> openssl (1.1.0e-1) unstable; urgency=high
>
> *
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: unblock
Severity: normal
Hi,
There was a new upstream release fixing a high severity security
issue.
The changelog entry is:
openssl (1.1.0e-1) unstable; urgency=high
* New upstream version
- Fixes
s. The d-2
>>> version fixes a regression discovered by perl and FTBFS of openssl
>>> itself if arch-any and arch-all were built in one go.
>>>
>>> unblock openssl/1.1.0d-2
>>
>> That includes some changes we don't like during the freeze, but given th
> > itself if arch-any and arch-all were built in one go.
> >
> > unblock openssl/1.1.0d-2
>
> That includes some changes we don't like during the freeze, but given those
> were
> done before the freeze and I wouldn't want them reverted this early in the
> freeze,
to the new release of the d version which fixes 3 CVE bugs. The
> > d-2 version fixes a regression discovered by perl and FTBFS of
> > openssl itself if arch-any and arch-all were built in one go.
> >
> > unblock openssl/1.1.0d-2
>
> That includes some changes we don't l
ted changes which did not migrate in time due
> to the new release of the d version which fixes 3 CVE bugs. The d-2
> version fixes a regression discovered by perl and FTBFS of openssl
> itself if arch-any and arch-all were built in one go.
>
> unblock openssl/1.1.0d-2
That includ
Your message dated Mon, 30 Mar 2015 07:48:08 +0100
with message-id
891b44149957154b87faf0c8581a4...@mowgli.jungle.funky-badger.org
and subject line Re: Bug#780902: unblock: openssl/1.0.1k-2
has caused the Debian Bug report #780902,
regarding unblock: openssl/1.0.1k-2
to be marked as done
Control: tag -1 confirmed
Adam D. Barratt a...@adam-barratt.org.uk (2015-03-21):
On Sat, 2015-03-21 at 10:40 +0100, Kurt Roeckx wrote:
1.0.1k-2 contains security fixes. Could you please unblock it?
Unblocked but needs a d-i ack as usual.
No objections, thanks.
Mraw,
KiBi.
signature.asc
Processing control commands:
tag -1 confirmed
Bug #780902 [release.debian.org] unblock: openssl/1.0.1k-2
Added tag(s) confirmed.
--
780902: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780902
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--
To UNSUBSCRIBE, email
On Tue, 2015-03-24 at 21:48 +0100, Kurt Roeckx wrote:
On Sat, Mar 21, 2015 at 07:51:32PM +, Adam D. Barratt wrote:
Control: tags -1 + d-i
On Sat, 2015-03-21 at 10:40 +0100, Kurt Roeckx wrote:
1.0.1k-2 contains security fixes. Could you please unblock it?
Unblocked but needs a
On Sat, Mar 21, 2015 at 07:51:32PM +, Adam D. Barratt wrote:
Control: tags -1 + d-i
On Sat, 2015-03-21 at 10:40 +0100, Kurt Roeckx wrote:
1.0.1k-2 contains security fixes. Could you please unblock it?
Unblocked but needs a d-i ack as usual.
I've just make an upload of 1.0.1k-3 that
Adam D. Barratt a...@adam-barratt.org.uk (2015-03-21):
Control: tags -1 + d-i
On Sat, 2015-03-21 at 10:40 +0100, Kurt Roeckx wrote:
1.0.1k-2 contains security fixes. Could you please unblock it?
Unblocked but needs a d-i ack as usual.
Please hold on until after rc2 is out (due this
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Hi,
1.0.1k-2 contains security fixes. Could you please unblock it?
Kurt
--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble?
Processing control commands:
tags -1 + d-i
Bug #780902 [release.debian.org] unblock: openssl/1.0.1k-2
Added tag(s) d-i.
--
780902: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780902
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--
To UNSUBSCRIBE, email to debian
Control: tags -1 + d-i
On Sat, 2015-03-21 at 10:40 +0100, Kurt Roeckx wrote:
1.0.1k-2 contains security fixes. Could you please unblock it?
Unblocked but needs a d-i ack as usual.
Regards,
Adam
--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of
Control: tag -1 confirmed
Kurt Roeckx k...@roeckx.be (2015-01-20):
Can you ACK that, or is there someone else in the d-i team that
can do that?
Not at the time this unblock was requested or pinged, but right now:
yes.
Mraw,
KiBi.
signature.asc
Description: Digital signature
Processing control commands:
tag -1 confirmed
Bug #775025 [release.debian.org] unblock: openssl/1.0.1k-1
Added tag(s) confirmed.
--
775025: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775025
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--
To UNSUBSCRIBE, email
Your message dated Sun, 25 Jan 2015 22:47:48 +0100
with message-id 54c56484.7060...@thykier.net
and subject line Re: Bug#775025: unblock: openssl/1.0.1k-1
has caused the Debian Bug report #775025,
regarding unblock: openssl/1.0.1k-1
to be marked as done.
This means that you claim that the problem
Hi,
Can you ACK that, or is there someone else in the d-i team that
can do that?
Kurt
On Wed, Jan 14, 2015 at 05:52:58PM +0100, Niels Thykier wrote:
Control: tags -1 d-i
On 2015-01-10 12:01, Kurt Roeckx wrote:
Package: release.debian.org
Severity: normal
User:
Processing control commands:
tags -1 d-i
Bug #775025 [release.debian.org] unblock: openssl/1.0.1k-1
Added tag(s) d-i.
--
775025: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775025
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--
To UNSUBSCRIBE, email to debian
Control: tags -1 d-i
On 2015-01-10 12:01, Kurt Roeckx wrote:
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Hi,
I've uploaded a new upstream version of openssl to unstable. This
contains fixes for 7 security issues affecting
On Sat, Jan 10, 2015 at 12:01:33PM +0100, Kurt Roeckx wrote:
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Hi,
I've uploaded a new upstream version of openssl to unstable. This
contains fixes for 7 security issues affecting
Kurt,
On Tue, Jan 13, 2015 at 23:22:08 +0100, Kurt Roeckx wrote:
On Sat, Jan 10, 2015 at 12:01:33PM +0100, Kurt Roeckx wrote:
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Hi,
I've uploaded a new upstream version of
On Wed, Jan 14, 2015 at 12:00:52AM +0100, Julien Cristau wrote:
Kurt,
On Tue, Jan 13, 2015 at 23:22:08 +0100, Kurt Roeckx wrote:
On Sat, Jan 10, 2015 at 12:01:33PM +0100, Kurt Roeckx wrote:
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Hi,
I've uploaded a new upstream version of openssl to unstable. This
contains fixes for 7 security issues affecting jessie. It also
contains a lot of other bug fixes.
Can you please
Adam D. Barratt a...@adam-barratt.org.uk (19/03/2013):
Unblocked, but needs a udeb ack.
Looks good to me.
Mraw,
KiBi.
signature.asc
Description: Digital signature
Your message dated Fri, 22 Mar 2013 09:04:20 +
with message-id 0d4c26f1672bc13c29503d37099cc...@mail.adsl.funky-badger.org
and subject line Re: Bug#703362: unblock: openssl/1.0.1e-2
has caused the Debian Bug report #703362,
regarding unblock: openssl/1.0.1e-2
to be marked as done.
This means
Control: tags -1 + confirmed d-i
On 18.03.2013 19:58, Kurt Roeckx wrote:
Please unblock openssl/1.0.1e-2, it fixes a bunch of issues fixed
in upstream git since the 1.0.1e release.
Unblocked, but needs a udeb ack.
Regards,
Adam
--
To UNSUBSCRIBE, email to debian-release-requ
Processing control commands:
tags -1 + confirmed d-i
Bug #703362 [release.debian.org] unblock: openssl/1.0.1e-2
Added tag(s) d-i and confirmed.
--
703362: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=703362
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock openssl/1.0.1e-2, it fixes a bunch of issues fixed
in upstream git since the 1.0.1e release.
debdiff attached.
Kurt
diff -Nru openssl-1.0.1e/debian/changelog openssl
Your message dated Sun, 24 Feb 2013 23:10:15 +
with message-id 1361747415.20752.67.ca...@jacala.jungle.funky-badger.org
and subject line Re: Bug#700441: unblock openssl/1.0.1e-1
has caused the Debian Bug report #700441,
regarding unblock openssl/1.0.1e-1
to be marked as done.
This means
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Hi,
Could you please unblock openssl 1.0.1e-1?
It's a new upstream version that that fixes 3 security issues.
The patches for the security issues itself is rather large.
It also
Your message dated Sun, 12 Aug 2012 22:37:24 +0100
with message-id 1344807444.2978.96.ca...@jacala.jungle.funky-badger.org
and subject line Re: Bug#683317: unblock: openssl/1.0.1c-4
has caused the Debian Bug report #683317,
regarding unblock: openssl/1.0.1c-4
to be marked as done.
This means
On Mon, Jul 30, 2012 at 08:46:13PM +0200, Kurt Roeckx wrote:
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock openssl/1.0.1c-4
Here is the debdiff between the versions:
diff -Nru openssl-1.0.1c/debian/changelog
Hi,
Could openssl 0.9.8o-3 please be unblocked? It contains a
security fix.
Kurt
--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20101117172722.ga24...@roeckx.be
On Wed, 2010-11-17 at 18:27 +0100, Kurt Roeckx wrote:
Could openssl 0.9.8o-3 please be unblocked? It contains a
security fix.
Unblocked.
Regards,
Adam
--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact
Kurt Roeckx wrote:
Hi,
Can openssl 0.9.8g-16 be hinted to testing?
It fixes a security issue.
It has a udeb.
unblocked
Cheers
Luk
--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Hi,
Can openssl 0.9.8g-16 be hinted to testing?
It fixes a security issue.
It has a udeb.
Kurt
--
To UNSUBSCRIBE, email to debian-release-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
87 matches
Mail list logo