[ubuntu/quantal] openssl 1.0.1c-3ubuntu1 (Accepted)
Marc Deslauriers
marc.deslauriers at ubuntu.com
Tue Jul 3 14:30:19 UTC 2012
openssl (1.0.1c-3ubuntu1) quantal; urgency=low
* Resynchronise with Debian. Remaining changes:
- debian/libssl1.0.0.postinst:
+ Display a system restart required notification on libssl1.0.0
upgrade on servers.
+ Use a different priority for libssl1.0.0/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
- debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
in Debian).
- debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
rules}: Move runtime libraries to /lib, for the benefit of
wpasupplicant.
- debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
.pc.
- debian/rules:
+ Don't run 'make test' when cross-building.
+ Use host compiler when cross-building. Patch from Neil Williams.
+ Don't build for processors no longer supported: i586 (on i386)
+ Fix Makefile to properly clean up libs/ dirs in clean target.
+ Replace duplicate files in the doc directory with symlinks.
- Unapply patch c_rehash-multi and comment it out in the series as it
breaks parsing of certificates with CRLF line endings and other cases
(see Debian #642314 for discussion), it also changes the semantics of
c_rehash directories by requiring applications to parse hash link
targets as files containing potentially *multiple* certificates rather
than exactly one.
- Bump version passed to dh_makeshlibs to 1.0.1 for new symbols.
- debian/patches/tls12_workarounds.patch: workaround large client hello
issue: Compile with -DOPENSSL_MAX_TLS1_2_CIPHER_LENGTH=50 and
with -DOPENSSL_NO_TLS1_2_CLIENT.
* Dropped upstreamed patches:
- debian/patches/CVE-2012-2110.patch
- debian/patches/CVE-2012-2110b.patch
- debian/patches/CVE-2012-2333.patch
- debian/patches/CVE-2012-0884-extra.patch
- most of debian/patches/tls12_workarounds.patch
openssl (1.0.1c-3) unstable; urgency=low
* Disable padlock engine again, causes problems for hosts not supporting it.
openssl (1.0.1c-2) unstable; urgency=high
* Fix renegiotation when using TLS > 1.0. This breaks tor. Patch from
upstream. (Closes: #675990)
* Enable the padlock engine by default.
* Change default bits from 1024 to 2048 (Closes: #487152)
openssl (1.0.1c-1) unstable; urgency=high
* New upstream version
- Fixes CVE-2012-2333 (Closes: #672452)
openssl (1.0.1b-1) unstable; urgency=high
* New upstream version
- Remaps SSL_OP_NO_TLSv1_1, so applications linked to 1.0.0
can talk to servers supporting TLS 1.1 but not TLS 1.2
- Drop rc4_hmac_md5.patch, applied upstream
openssl (1.0.1a-3) unstable; urgency=low
* Use patch from upstream for the rc4_hmac_md5 issue.
openssl (1.0.1a-2) unstable; urgency=low
* Fix rc4_hmac_md5 on non-i386/amd64 arches.
openssl (1.0.1a-1) unstable; urgency=high
* New upstream version
- Fixes CVE-2012-2110
- Fix crash in rc4_hmac_md5 (Closes: #666405)
- Fixes some issues with talking to other servers when TLS 1.1 and 1.2 is
supported
- Drop patches no_ssl2.patch vpaes.patch tls1.2_client_algorithms.patch,
applied upstream.
Date: Fri, 29 Jun 2012 13:01:30 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/quantal/+source/openssl/1.0.1c-3ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Fri, 29 Jun 2012 13:01:30 -0400
Source: openssl
Binary: openssl libssl1.0.0 libcrypto1.0.0-udeb libssl1.0.0-udeb libssl-dev libssl-doc libssl1.0.0-dbg
Architecture: source
Version: 1.0.1c-3ubuntu1
Distribution: quantal
Urgency: high
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description:
libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl-doc - SSL development documentation documentation
libssl1.0.0 - SSL shared libraries
libssl1.0.0-dbg - Symbol tables for libssl and libcrypto
libssl1.0.0-udeb - ssl shared library - udeb (udeb)
openssl - Secure Socket Layer (SSL) binary and related cryptographic tools
Closes: 487152 666405 672452 675990
Changes:
openssl (1.0.1c-3ubuntu1) quantal; urgency=low
.
* Resynchronise with Debian. Remaining changes:
- debian/libssl1.0.0.postinst:
+ Display a system restart required notification on libssl1.0.0
upgrade on servers.
+ Use a different priority for libssl1.0.0/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
- debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
in Debian).
- debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
rules}: Move runtime libraries to /lib, for the benefit of
wpasupplicant.
- debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
.pc.
- debian/rules:
+ Don't run 'make test' when cross-building.
+ Use host compiler when cross-building. Patch from Neil Williams.
+ Don't build for processors no longer supported: i586 (on i386)
+ Fix Makefile to properly clean up libs/ dirs in clean target.
+ Replace duplicate files in the doc directory with symlinks.
- Unapply patch c_rehash-multi and comment it out in the series as it
breaks parsing of certificates with CRLF line endings and other cases
(see Debian #642314 for discussion), it also changes the semantics of
c_rehash directories by requiring applications to parse hash link
targets as files containing potentially *multiple* certificates rather
than exactly one.
- Bump version passed to dh_makeshlibs to 1.0.1 for new symbols.
- debian/patches/tls12_workarounds.patch: workaround large client hello
issue: Compile with -DOPENSSL_MAX_TLS1_2_CIPHER_LENGTH=50 and
with -DOPENSSL_NO_TLS1_2_CLIENT.
* Dropped upstreamed patches:
- debian/patches/CVE-2012-2110.patch
- debian/patches/CVE-2012-2110b.patch
- debian/patches/CVE-2012-2333.patch
- debian/patches/CVE-2012-0884-extra.patch
- most of debian/patches/tls12_workarounds.patch
.
openssl (1.0.1c-3) unstable; urgency=low
.
* Disable padlock engine again, causes problems for hosts not supporting it.
.
openssl (1.0.1c-2) unstable; urgency=high
.
* Fix renegiotation when using TLS > 1.0. This breaks tor. Patch from
upstream. (Closes: #675990)
* Enable the padlock engine by default.
* Change default bits from 1024 to 2048 (Closes: #487152)
.
openssl (1.0.1c-1) unstable; urgency=high
.
* New upstream version
- Fixes CVE-2012-2333 (Closes: #672452)
.
openssl (1.0.1b-1) unstable; urgency=high
.
* New upstream version
- Remaps SSL_OP_NO_TLSv1_1, so applications linked to 1.0.0
can talk to servers supporting TLS 1.1 but not TLS 1.2
- Drop rc4_hmac_md5.patch, applied upstream
.
openssl (1.0.1a-3) unstable; urgency=low
.
* Use patch from upstream for the rc4_hmac_md5 issue.
.
openssl (1.0.1a-2) unstable; urgency=low
.
* Fix rc4_hmac_md5 on non-i386/amd64 arches.
.
openssl (1.0.1a-1) unstable; urgency=high
.
* New upstream version
- Fixes CVE-2012-2110
- Fix crash in rc4_hmac_md5 (Closes: #666405)
- Fixes some issues with talking to other servers when TLS 1.1 and 1.2 is
supported
- Drop patches no_ssl2.patch vpaes.patch tls1.2_client_algorithms.patch,
applied upstream.
Checksums-Sha1:
fdfd768908079137dbe828c06a878356df58100c 2374 openssl_1.0.1c-3ubuntu1.dsc
91b684de947cb021ac61b8c51027cc4b63d894ce 4457113 openssl_1.0.1c.orig.tar.gz
ff6f2910c6ac15e08fa5c7ba18d72b037343ddc2 98062 openssl_1.0.1c-3ubuntu1.debian.tar.gz
Checksums-Sha256:
a2a6d3f4fc09dc1a1fec15bbe28b2b88e995e7632cf2060e4a5d40bffaf535c7 2374 openssl_1.0.1c-3ubuntu1.dsc
2a9eb3cd4e8b114eb9179c0d3884d61658e7d8e8bf4984798a5f5bd48e325ebe 4457113 openssl_1.0.1c.orig.tar.gz
3c9937fd40e1c4a20e979a70424ed26395abc92b228338bca0f75f4bbf28aa98 98062 openssl_1.0.1c-3ubuntu1.debian.tar.gz
Files:
9a17e7bb23aa66525a420f175c1b8016 2374 utils optional openssl_1.0.1c-3ubuntu1.dsc
ae412727c8c15b67880aef7bd2999b2e 4457113 utils optional openssl_1.0.1c.orig.tar.gz
cc88dab98a96dc3289f98182fe82d84a 98062 utils optional openssl_1.0.1c-3ubuntu1.debian.tar.gz
Original-Maintainer: Debian OpenSSL Team <pkg-openssl-devel at lists.alioth.debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)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=V8RO
-----END PGP SIGNATURE-----
More information about the Quantal-changes
mailing list