openssl (1.0.2f-2ubuntu1) xenial; urgency=medium * Merge with Debian, remaining changes. - Disable SSLv3 without changing ABI: + debian/patches/no-sslv3.patch: Disable SSLv3 without using the no-ssl3-method option + debian/rules: don't use no-ssl3-method, don't bump soname + debian/patches/engines-path.patch: don't bump soname + debian/patches/version-script.patch: don't bump soname + debian/patches/soname.patch: removed + debian/lib*: don't bump soname - debian/control: don't enable rfc3779 and cms support for now as it changes ABI. - debian/libssl1.0.0.postinst: + Display a system restart required notification on libssl1.0.0 upgrade on servers. + Use a different priority for libssl1.0.0/restart-services depending on whether a desktop, or server dist-upgrade is being performed. - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package in Debian). - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files, rules}: Move runtime libraries to /lib, for the benefit of wpasupplicant. - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under .pc. - debian/rules: + Don't run 'make test' when cross-building. + Use host compiler when cross-building. Patch from Neil Williams. + Don't build for processors no longer supported: i586 (on i386) + Fix Makefile to properly clean up libs/ dirs in clean target. + Replace duplicate files in the doc directory with symlinks. - debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-* - debian/rules: Enable optimized 64bit elliptic curve code contributed by Google. * debian/patches/CVE-2016-0701.patch: dropped, upstream.
openssl (1.0.2f-2) unstable; urgency=high * New upstream version. - Fixes CVE-2016-0701 - Not affected by CVE-2015-3197 because SSLv2 is disabled. Date: Tue, 02 Feb 2016 13:37:21 -0500 Changed-By: Marc Deslauriers <marc.deslauri...@ubuntu.com> Maintainer: Ubuntu Developers <ubuntu-devel-disc...@lists.ubuntu.com> https://launchpad.net/ubuntu/+source/openssl/1.0.2f-2ubuntu1
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Tue, 02 Feb 2016 13:37:21 -0500 Source: openssl Binary: openssl libssl1.0.0 libcrypto1.0.0-udeb libssl1.0.0-udeb libssl-dev libssl-doc libssl1.0.0-dbg Architecture: source Version: 1.0.2f-2ubuntu1 Distribution: xenial Urgency: high Maintainer: Ubuntu Developers <ubuntu-devel-disc...@lists.ubuntu.com> Changed-By: Marc Deslauriers <marc.deslauri...@ubuntu.com> Description: libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer toolkit - development documentation libssl1.0.0 - Secure Sockets Layer toolkit - shared libraries libssl1.0.0-dbg - Secure Sockets Layer toolkit - debug information libssl1.0.0-udeb - ssl shared library - udeb (udeb) openssl - Secure Sockets Layer toolkit - cryptographic utility Changes: openssl (1.0.2f-2ubuntu1) xenial; urgency=medium . * Merge with Debian, remaining changes. - Disable SSLv3 without changing ABI: + debian/patches/no-sslv3.patch: Disable SSLv3 without using the no-ssl3-method option + debian/rules: don't use no-ssl3-method, don't bump soname + debian/patches/engines-path.patch: don't bump soname + debian/patches/version-script.patch: don't bump soname + debian/patches/soname.patch: removed + debian/lib*: don't bump soname - debian/control: don't enable rfc3779 and cms support for now as it changes ABI. - debian/libssl1.0.0.postinst: + Display a system restart required notification on libssl1.0.0 upgrade on servers. + Use a different priority for libssl1.0.0/restart-services depending on whether a desktop, or server dist-upgrade is being performed. - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package in Debian). - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files, rules}: Move runtime libraries to /lib, for the benefit of wpasupplicant. - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under .pc. - debian/rules: + Don't run 'make test' when cross-building. + Use host compiler when cross-building. Patch from Neil Williams. + Don't build for processors no longer supported: i586 (on i386) + Fix Makefile to properly clean up libs/ dirs in clean target. + Replace duplicate files in the doc directory with symlinks. - debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-* - debian/rules: Enable optimized 64bit elliptic curve code contributed by Google. * debian/patches/CVE-2016-0701.patch: dropped, upstream. . openssl (1.0.2f-2) unstable; urgency=high . * New upstream version. - Fixes CVE-2016-0701 - Not affected by CVE-2015-3197 because SSLv2 is disabled. Checksums-Sha1: bf4434f3bb41bd66307d0a758f509b06a7f23655 2424 openssl_1.0.2f-2ubuntu1.dsc 2047c592a6e5a42bd37970bdb4a931428110a927 5258384 openssl_1.0.2f.orig.tar.gz 86fb23cfff853be6107d078e6884dc1e5f5cae7a 86644 openssl_1.0.2f-2ubuntu1.debian.tar.xz Checksums-Sha256: c56167e78dbd999aff1b8bd6ded75e73631ddb83daced140354deffe07971e11 2424 openssl_1.0.2f-2ubuntu1.dsc 932b4ee4def2b434f85435d9e3e19ca8ba99ce9a065a61524b429a9d5e9b2e9c 5258384 openssl_1.0.2f.orig.tar.gz b2275c52be39e1aa3bdfa17982caed64bcceb9e863bc2db40ec9a30fb668406c 86644 openssl_1.0.2f-2ubuntu1.debian.tar.xz Files: 72b1e183b1725c869205207e90b6c8e6 2424 utils optional openssl_1.0.2f-2ubuntu1.dsc b3bf73f507172be9292ea2a8c28b659d 5258384 utils optional openssl_1.0.2f.orig.tar.gz ff24479643c2713e542af69926486599 86644 utils optional openssl_1.0.2f-2ubuntu1.debian.tar.xz Original-Maintainer: Debian OpenSSL Team <pkg-openssl-de...@lists.alioth.debian.org> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJWsQH/AAoJEGVp2FWnRL6TsSkP/jVqZrJeMqfzufM/yVjdxSXG 08xxIyAVrDvnS2EzyVgWGUlmirxqbF0dG6YcWqi53pDrDJ8QdgluQDl34fTBKKM7 pnHRA2hIBXIHZzHcorGUDdLZV0uCgn2+c38HDlQQyz9Z4bguzZN9BQWz8/h7F4QX 85TBApN5/YJYdxDFmIdPuB+qsq3il9U2dJwXh2LEzLrfzWhu+Y0W16h8E7kD7Ntg gtzqk0wDeAFjXCd16h2UieuQM6jX8NqB3G+i17Vkk3oVCHm+R5N2DgdhyshGylXC 9uKpa2PqoKCoookSOmuniJkCeHn1psUHliTyDQdFhy04TMeovXRwlDdr46J6BV8r l+FiVc03v0J09Oj2VfPeUYNJ/WG8238ZnT5Jsxz7zdFrW1aweBS/BqTkSu1qIB+V URw+5016ZrqZzvcw+f2AZE/gATzt2vcp9IFSBsiMgWGN17f4FCD9MKGhAOCO/9+2 aL3WgOb+pUlMJUBdhXz5+q0hwwq3DEHPHqhxiqE+7LmhiaBjR3Qj4+QGxFphJW82 qlwGnAlneP7Tl7cOSqZMWBVJgwO8S/B8UtkILOaEFXT/lDfqsJQBaoBisY7chJBy eaglOa2nzb794X+FcDuQlvcO/G0ZWjd65UKVr6KfVPsWTTm4VGwGOlE41Sd7xw8G rnv84PKmBkOHta00FAgR =qM2W -----END PGP SIGNATURE-----
-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes