openssl (1.0.1f-1ubuntu1) trusty; urgency=low * Merge with Debian, remaining changes. - debian/libssl1.0.0.postinst: + Display a system restart required notification on libssl1.0.0 upgrade on servers. + Use a different priority for libssl1.0.0/restart-services depending on whether a desktop, or server dist-upgrade is being performed. - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package in Debian). - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files, rules}: Move runtime libraries to /lib, for the benefit of wpasupplicant. - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under .pc. - debian/rules: + Don't run 'make test' when cross-building. + Use host compiler when cross-building. Patch from Neil Williams. + Don't build for processors no longer supported: i586 (on i386) + Fix Makefile to properly clean up libs/ dirs in clean target. + Replace duplicate files in the doc directory with symlinks. - debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-* - debian/patches/ubuntu_deb676533_arm_asm.patch: Enable arm assembly code. - debian/rules: Enable optimized 64bit elliptic curve code contributed by Google. * Dropped changes: - debian/patches/arm64-support: included in debian-targets.patch - debian/patches/no_default_rdrand.patch: upstream - debian/patches/openssl-1.0.1e-env-zlib.patch: zlib is now completely disabled in debian/rules
openssl (1.0.1f-1) unstable; urgency=high * New upstream version - Fix for TLS record tampering bug CVE-2013-4353 - Drop the snapshot patch * update watch file to check for upstream signature and add upstream pgp key. * Drop conflicts against openssh since we now on a released version again. openssl (1.0.1e-6) unstable; urgency=medium * Add Breaks: openssh-client (<< 1:6.4p1-1.1), openssh-server (<< 1:6.4p1-1.1). This is to prevent people running into #732940. This Breaks can be removed again when we stop using a git snapshot. openssl (1.0.1e-5) unstable; urgency=low * Change default digest to SHA256 instead of SHA1. (Closes: #694738) * Drop support for multiple certificates in 1 file. It never worked properly in the first place, and the only one shipping in ca-certificates has been split. * Fix libdoc-manpgs-pod-spell.patch to only fix spalling errors * Remove make-targets.patch. It prevented the test dir from being cleaned. * Update to a git snapshot of the OpenSSL_1_0_1-stable branch. - Fixes CVE-2013-6449 (Closes: #732754) - Fixes CVE-2013-6450 - Drop patches ssltest_no_sslv2.patch cpuid.patch aesni-mac.patch dtls_version.patch get_certificate.patch, since they where all already commited upstream. - adjust fix-pod-errors.patch for the reordering of items in the documentation they've done trying to fix those pod errors. - disable rdrand engine by default (Closes: #732710) * disable zlib support. Fixes CVE-2012-4929 (Closes: #728055) * Add arm64 support (Closes: #732348) * Properly use the default number of bits in req when none are given Date: Wed, 08 Jan 2014 15:57:24 -0500 Changed-By: Marc Deslauriers <marc.deslauri...@ubuntu.com> Maintainer: Ubuntu Developers <ubuntu-devel-disc...@lists.ubuntu.com> https://launchpad.net/ubuntu/trusty/+source/openssl/1.0.1f-1ubuntu1
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Wed, 08 Jan 2014 15:57:24 -0500 Source: openssl Binary: openssl libssl1.0.0 libcrypto1.0.0-udeb libssl1.0.0-udeb libssl-dev libssl-doc libssl1.0.0-dbg Architecture: source Version: 1.0.1f-1ubuntu1 Distribution: trusty Urgency: high Maintainer: Ubuntu Developers <ubuntu-devel-disc...@lists.ubuntu.com> Changed-By: Marc Deslauriers <marc.deslauri...@ubuntu.com> Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer toolkit - development documentation libssl1.0.0 - Secure Sockets Layer toolkit - shared libraries libssl1.0.0-dbg - Secure Sockets Layer toolkit - debug information libssl1.0.0-udeb - ssl shared library - udeb (udeb) openssl - Secure Sockets Layer toolkit - cryptographic utility Closes: 694738 728055 732348 732710 732754 Changes: openssl (1.0.1f-1ubuntu1) trusty; urgency=low . * Merge with Debian, remaining changes. - debian/libssl1.0.0.postinst: + Display a system restart required notification on libssl1.0.0 upgrade on servers. + Use a different priority for libssl1.0.0/restart-services depending on whether a desktop, or server dist-upgrade is being performed. - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package in Debian). - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files, rules}: Move runtime libraries to /lib, for the benefit of wpasupplicant. - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under .pc. - debian/rules: + Don't run 'make test' when cross-building. + Use host compiler when cross-building. Patch from Neil Williams. + Don't build for processors no longer supported: i586 (on i386) + Fix Makefile to properly clean up libs/ dirs in clean target. + Replace duplicate files in the doc directory with symlinks. - debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-* - debian/patches/ubuntu_deb676533_arm_asm.patch: Enable arm assembly code. - debian/rules: Enable optimized 64bit elliptic curve code contributed by Google. * Dropped changes: - debian/patches/arm64-support: included in debian-targets.patch - debian/patches/no_default_rdrand.patch: upstream - debian/patches/openssl-1.0.1e-env-zlib.patch: zlib is now completely disabled in debian/rules . openssl (1.0.1f-1) unstable; urgency=high . * New upstream version - Fix for TLS record tampering bug CVE-2013-4353 - Drop the snapshot patch * update watch file to check for upstream signature and add upstream pgp key. * Drop conflicts against openssh since we now on a released version again. . openssl (1.0.1e-6) unstable; urgency=medium . * Add Breaks: openssh-client (<< 1:6.4p1-1.1), openssh-server (<< 1:6.4p1-1.1). This is to prevent people running into #732940. This Breaks can be removed again when we stop using a git snapshot. . openssl (1.0.1e-5) unstable; urgency=low . * Change default digest to SHA256 instead of SHA1. (Closes: #694738) * Drop support for multiple certificates in 1 file. It never worked properly in the first place, and the only one shipping in ca-certificates has been split. * Fix libdoc-manpgs-pod-spell.patch to only fix spalling errors * Remove make-targets.patch. It prevented the test dir from being cleaned. * Update to a git snapshot of the OpenSSL_1_0_1-stable branch. - Fixes CVE-2013-6449 (Closes: #732754) - Fixes CVE-2013-6450 - Drop patches ssltest_no_sslv2.patch cpuid.patch aesni-mac.patch dtls_version.patch get_certificate.patch, since they where all already commited upstream. - adjust fix-pod-errors.patch for the reordering of items in the documentation they've done trying to fix those pod errors. - disable rdrand engine by default (Closes: #732710) * disable zlib support. Fixes CVE-2012-4929 (Closes: #728055) * Add arm64 support (Closes: #732348) * Properly use the default number of bits in req when none are given Checksums-Sha1: 8b237cbfa298d58d5da3e571c5d22df640c5e97a 2375 openssl_1.0.1f-1ubuntu1.dsc 9ef09e97dfc9f14ac2c042f3b7e301098794fc0f 4509212 openssl_1.0.1f.orig.tar.gz 1ce4c884c9b6e4e4a7ddbf3a32ff9835f2a46e3a 109690 openssl_1.0.1f-1ubuntu1.debian.tar.gz Checksums-Sha256: 9f5bcc4fa75df01b871bff28a32407de126b34f4c8b4b4cd2b1b6c0bdc80f244 2375 openssl_1.0.1f-1ubuntu1.dsc 6cc2a80b17d64de6b7bac985745fdaba971d54ffd7d38d3556f998d7c0c9cb5a 4509212 openssl_1.0.1f.orig.tar.gz 2c87d1148b927f1c064870e288c84ba94572b9849b8623005cadb62fa0b60f67 109690 openssl_1.0.1f-1ubuntu1.debian.tar.gz Files: a93f0ddf476c562859321f13c75b3d55 2375 utils optional openssl_1.0.1f-1ubuntu1.dsc f26b09c028a0541cab33da697d522b25 4509212 utils optional openssl_1.0.1f.orig.tar.gz 5322d861b3500c7fc63141505f4c984a 109690 utils optional openssl_1.0.1f-1ubuntu1.debian.tar.gz Original-Maintainer: Debian OpenSSL Team <pkg-openssl-de...@lists.alioth.debian.org> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (GNU/Linux) iQIcBAEBCgAGBQJSz+eiAAoJEGVp2FWnRL6TY2gP/iG6rjvQ90yqkKIW69cQbH2y PZyXnbu9A2tiLoNKsHwFxifbR6HaBr7Y5Pmr39w2DcfFQZehcUQlE0YEuKas63Fi 6q67IOzyY/THT3B+oTn8nChf9UGkeGogHWv0HSBg+lKWiBiu+tcFhuDgbWKd3aOt NZfRwQoe/U8S16E7ELU/BQPOqb3GFZSV8EHDKrOv3DNf8WgP4vDOMWHM015u2cKo 3bDKI5p651RDGX+SbPdAKGiyac6yQy9WhUNZbsxTw0jYoOJ9RnuxF5P9FcMS6E9M l/wU6qr0P4u/HMz4Tf4IIKa7JSFnrG8M4KdAJahejaLDJIY2bpcmIEzzb5mBCmO6 ul0IljvPGo8o0anZsBDaJ6bck3t3Wj+r6Z0EMarQhn5cD4gK7r+LWfrLl5MMdzHy W1bQezUhXuTZZjrmiae6sRFTrXno4eSudD3jcCN5yNj+T1nFsEx8SUQP2Q8ehz/2 aFLvD/AxYhpt/9wEoAO+z8fnvP53b3cp6JNDeENESHZOEquVpFVoLpJMlE8c/KQE EK1ao9hmOrxnnKmgIK3RmmHsHMAeN6UdNwfPfR9j/X0S6f4irg9fBbQ3MQk8N0ma RasWwLrHjLP93gX13Bg0tYcRV5iuTHi89TjiyPjmilKQWE8JQX0RsAz7AQ+aT8qD 3arqFZIbCzrLmwfbROBR =5yzn -----END PGP SIGNATURE-----
-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes