[ubuntu/lunar-proposed] openssl 3.0.7-1ubuntu1 (Accepted)
Adrien Nader
adrien.nader at canonical.com
Thu Jan 12 11:23:14 UTC 2023
openssl (3.0.7-1ubuntu1) lunar; urgency=medium
* Merge 3.0.7 from Debian unstable (LP: #1998942)
- Drop patches merged upstream:
+ CVE-2022-3358.patch
+ CVE-2022-3602-1.patch
+ CVE-2022-3602-2.patch
- Shrink patch since upstream fixed some tests in the patch above:
+ tests-use-seclevel-1.patch
- Drop patch since -DOPENSSL_TLS_SECURITY_LEVEL=2 is now hard-coded:
+ Set-systemwide-default-settings-for-libssl-users.patch
- Drop Debian patch not needed anymore:
+ TEST-Provide-a-default-openssl.cnf-for-tests.patch
- Mention Debian as defaulting to SECLEVEL=2 in addition to Ubuntu:
+ tls1.2-min-seclevel2.patch
- Remaining changes:
+ Symlink changelog{,.Debian}.gz and copyright.gz from libssl-dev to
openssl
+ d/libssl3.postinst: Revert Debian deletion
- Skip services restart & reboot notification if needrestart is in-use.
- Bump version check to 1.1.1 (bug opened as LP: #1999139)
- Use a different priority for libssl1.1/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
- Import libraries/restart-without-asking template as used by above.
+ Add support for building with noudeb build profile.
+ Use perl:native in the autopkgtest for installability on i386.
* Correct comment as to which TLS version is disabled with our seclevel:
- skip_tls1.1_seclevel3_tests.patch
[Sebastian Andrzej Siewior]
* CVE-2022-3996 (X.509 Policy Constraints Double Locking).
openssl (3.0.7-1) unstable; urgency=medium
* Import 3.0.7
- Using a Custom Cipher with NID_undef may lead to NULL encryption
(CVE-2022-3358) (Closes: #1021620).
- X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602).
- X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786).
* Disable rdrand engine (the opcode on x86).
* Remove config bits for MIPS R6, the generic MIPS config can be used.
openssl (3.0.5-4) unstable; urgency=medium
* Add ssl_conf() serialisation (Closes: #1020308).
openssl (3.0.5-3) unstable; urgency=medium
* Add cert.pem symlink pointing to ca-certificates' ca-certificates.crt
(Closes: #805646).
* Compile with OPENSSL_TLS_SECURITY_LEVEL=2 (Closes: #918727).
Date: Tue, 06 Dec 2022 15:11:40 +0100
Changed-By: Adrien Nader <adrien.nader at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Simon Chopin <simon.chopin at canonical.com>
https://launchpad.net/ubuntu/+source/openssl/3.0.7-1ubuntu1
-------------- next part --------------
Format: 1.8
Date: Tue, 06 Dec 2022 15:11:40 +0100
Source: openssl
Built-For-Profiles: noudeb
Architecture: source
Version: 3.0.7-1ubuntu1
Distribution: lunar
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Adrien Nader <adrien.nader at canonical.com>
Closes: 805646 918727 1020308 1021620
Launchpad-Bugs-Fixed: 1998942 1999139
Changes:
openssl (3.0.7-1ubuntu1) lunar; urgency=medium
.
* Merge 3.0.7 from Debian unstable (LP: #1998942)
- Drop patches merged upstream:
+ CVE-2022-3358.patch
+ CVE-2022-3602-1.patch
+ CVE-2022-3602-2.patch
- Shrink patch since upstream fixed some tests in the patch above:
+ tests-use-seclevel-1.patch
- Drop patch since -DOPENSSL_TLS_SECURITY_LEVEL=2 is now hard-coded:
+ Set-systemwide-default-settings-for-libssl-users.patch
- Drop Debian patch not needed anymore:
+ TEST-Provide-a-default-openssl.cnf-for-tests.patch
- Mention Debian as defaulting to SECLEVEL=2 in addition to Ubuntu:
+ tls1.2-min-seclevel2.patch
- Remaining changes:
+ Symlink changelog{,.Debian}.gz and copyright.gz from libssl-dev to
openssl
+ d/libssl3.postinst: Revert Debian deletion
- Skip services restart & reboot notification if needrestart is in-use.
- Bump version check to 1.1.1 (bug opened as LP: #1999139)
- Use a different priority for libssl1.1/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
- Import libraries/restart-without-asking template as used by above.
+ Add support for building with noudeb build profile.
+ Use perl:native in the autopkgtest for installability on i386.
* Correct comment as to which TLS version is disabled with our seclevel:
- skip_tls1.1_seclevel3_tests.patch
.
[Sebastian Andrzej Siewior]
* CVE-2022-3996 (X.509 Policy Constraints Double Locking).
.
openssl (3.0.7-1) unstable; urgency=medium
.
* Import 3.0.7
- Using a Custom Cipher with NID_undef may lead to NULL encryption
(CVE-2022-3358) (Closes: #1021620).
- X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602).
- X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786).
* Disable rdrand engine (the opcode on x86).
* Remove config bits for MIPS R6, the generic MIPS config can be used.
.
openssl (3.0.5-4) unstable; urgency=medium
.
* Add ssl_conf() serialisation (Closes: #1020308).
.
openssl (3.0.5-3) unstable; urgency=medium
.
* Add cert.pem symlink pointing to ca-certificates' ca-certificates.crt
(Closes: #805646).
* Compile with OPENSSL_TLS_SECURITY_LEVEL=2 (Closes: #918727).
Checksums-Sha1:
2684649d602b529c364298c5f08c1c5168d4f313 2544 openssl_3.0.7-1ubuntu1.dsc
f20736d6aae36bcbfa9aba0d358c71601833bf27 15107575 openssl_3.0.7.orig.tar.gz
7b4c50ff27fadda7680a985ae2e6b5716f092e56 858 openssl_3.0.7.orig.tar.gz.asc
d589804350a3e20e5107eace2806afd122873d0c 106024 openssl_3.0.7-1ubuntu1.debian.tar.xz
9a8d773a86611e3517cf5c977f6a546f38ebc454 8001 openssl_3.0.7-1ubuntu1_source.buildinfo
Checksums-Sha256:
db6e96457ed02649cd50e9a740882cae25eb62865c6f62a61f55800754b5e513 2544 openssl_3.0.7-1ubuntu1.dsc
83049d042a260e696f62406ac5c08bf706fd84383f945cf21bd61e9ed95c396e 15107575 openssl_3.0.7.orig.tar.gz
18be1d820b25ed5c7d8efe4fdba0b947925273ca114bbd78faecbd99a52df203 858 openssl_3.0.7.orig.tar.gz.asc
10f3af70358b3120364c3588873b0b7e56bdab1fc8f4d3de3156eb817f88f74c 106024 openssl_3.0.7-1ubuntu1.debian.tar.xz
cd1386ec85b615c1d4a50f175c48be919843d35e576f08ea4356dfd3859be52e 8001 openssl_3.0.7-1ubuntu1_source.buildinfo
Files:
5932f7abab42b84894068810c6e6beeb 2544 utils optional openssl_3.0.7-1ubuntu1.dsc
545478ce41b96bf3beacb4dc58b36c77 15107575 utils optional openssl_3.0.7.orig.tar.gz
8cf6d88be580b37f4af4ea25424f4d2a 858 utils optional openssl_3.0.7.orig.tar.gz.asc
193adfe6cbdb98b45a14142ad43d7902 106024 utils optional openssl_3.0.7-1ubuntu1.debian.tar.xz
09a8c783eda7930b0943066945769a34 8001 utils optional openssl_3.0.7-1ubuntu1_source.buildinfo
Original-Maintainer: Debian OpenSSL Team <pkg-openssl-devel at alioth-lists.debian.net>
More information about the lunar-changes
mailing list