[Touch-packages] [Bug 1626773] Re: CVE-2016-2182.patch has broken BN_bn2dec broken in 1.0.1
Below a minimal example: https://gist.github.com/jeroenooms/cc9391276b160404c5a635f961bc06f6 ** Summary changed: - CVE-2016-2182.patch has broken BN_bn2dec broken in 1.0.1 + CVE-2016-2182.patch has broken BN_bn2dec -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to openssl in Ubuntu. https://bugs.launchpad.net/bugs/1626773 Title: CVE-2016-2182.patch has broken BN_bn2dec Status in openssl package in Ubuntu: Incomplete Bug description: My software which links to libcrypto stopped working on both Ubuntu 12.04 / 14.04 / 16.04 last week. The problem is that BN_bn2dec returns NULL all the time (without setting an error message) even for valid input values. I think is a bug in CVE-2016-2182.patch. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1626773/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
[Touch-packages] [Bug 1626773] Re: CVE-2016-2182.patch has broken BN_bn2dec broken in 1.0.1
Can you provide some more details? USN-3087-1 was released just a few hours ago; if your software stopped working last week, it'd be worth investigating what packages changed last week, rather than today. Thanks ** Changed in: openssl (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to openssl in Ubuntu. https://bugs.launchpad.net/bugs/1626773 Title: CVE-2016-2182.patch has broken BN_bn2dec broken in 1.0.1 Status in openssl package in Ubuntu: Incomplete Bug description: My software which links to libcrypto stopped working on both Ubuntu 12.04 / 14.04 / 16.04 last week. The problem is that BN_bn2dec returns NULL all the time (without setting an error message) even for valid input values. I think is a bug in CVE-2016-2182.patch. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1626773/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp