[ubuntu/wily-proposed] openssl 1.0.2a-1ubuntu1 (Accepted)
Marc Deslauriers
marc.deslauriers at ubuntu.com
Tue May 12 18:13:17 UTC 2015
openssl (1.0.2a-1ubuntu1) wily; urgency=medium
* Merge with Debian, remaining changes.
- debian/libssl1.0.0.postinst:
+ Display a system restart required notification on libssl1.0.0
upgrade on servers.
+ Use a different priority for libssl1.0.0/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
- debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
in Debian).
- debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
rules}: Move runtime libraries to /lib, for the benefit of
wpasupplicant.
- debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
.pc.
- debian/rules:
+ Don't run 'make test' when cross-building.
+ Use host compiler when cross-building. Patch from Neil Williams.
+ Don't build for processors no longer supported: i586 (on i386)
+ Fix Makefile to properly clean up libs/ dirs in clean target.
+ Replace duplicate files in the doc directory with symlinks.
- debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
- debian/rules: Enable optimized 64bit elliptic curve code contributed
by Google.
* Dropped patches included in new version:
- ppc64-support.patch, CVE-2014-0076.patch, CVE-2014-0160.patch,
CVE-2010-5298.patch, CVE-2014-0198.patch, CVE-2014-0195.patch,
CVE-2014-0221.patch, CVE-2014-0224-1.patch, CVE-2014-0224-2.patch,
CVE-2014-3470.patch, CVE-2014-0224-3.patch,
CVE-2014-0224-regression.patch, CVE-2014-0224-regression2.patch,
CVE-2014-3505.patch, CVE-2014-3506.patch, CVE-2014-3507.patch,
CVE-2014-3508.patch, CVE-2014-3509.patch, CVE-2014-3510.patch,
CVE-2014-3511.patch, CVE-2014-3512.patch, CVE-2014-5139.patch,
power8-optimisations.patch, tls_fallback_scsv_support.patch,
CVE-2014-3513.patch, CVE-2014-3567.patch, CVE-2014-3568.patch,
CVE-2014-3569.patch, CVE-2014-3570.patch, CVE-2014-3571-1.patch,
CVE-2014-3571-2.patch, CVE-2014-3572.patch, CVE-2014-8275.patch,
CVE-2015-0204.patch, CVE-2015-0205.patch, CVE-2015-0206.patch,
CVE-2015-0209.patch, CVE-2015-0286.patch, CVE-2015-0287.patch,
CVE-2015-0288.patch, CVE-2015-0289.patch, CVE-2015-0292.patch,
CVE-2015-0293.patch, CVE-2015-0209-2.patch, CVE-2015-0293-2.patch
openssl (1.0.2a-1) unstable; urgency=medium
* New upstrema version
- Fix CVE-2015-0286
- Fix CVE-2015-0287
- Fix CVE-2015-0289
- Fix CVE-2015-0293 (not affected, SSLv2 disabled)
- Fix CVE-2015-0209
- Fix CVE-2015-0288
- Fix CVE-2015-0291
- Fix CVE-2015-0290
- Fix CVE-2015-0207
- Fix CVE-2015-0208
- Fix CVE-2015-1787
- Fix CVE-2015-0285
* Temporary enable SSLv3 methods again, but they will go away.
* Don't set TERMIO anymore, use the default TERMIOS instead.
openssl (1.0.2-1) experimental; urgency=medium
* New upstream release
- Fixes CVE-2014-3571
- Fixes CVE-2015-0206
- Fixes CVE-2014-3569
- Fixes CVE-2014-3572
- Fixes CVE-2015-0204
- Fixes CVE-2015-0205
- Fixes CVE-2014-8275
- Fixes CVE-2014-3570
- Drop git_snapshot.patch
* Drop gnu_source.patch, dgst_hmac.patch, stddef.patch,
no_ssl3_method.patch: applied upstream
* Update patches to apply
openssl (1.0.2~beta3-1) experimental; urgency=low
* New usptream beta version
* Add git snapshot
* Merge changes between 1.0.1h-3 and 1.0.1j-1:
- Disables SSLv3 because of CVE-2014-3566
* Drop patch rehash-crt.patch: partially applied upstream.
c_rehash now doesn't support files in DER format anymore.
* Drop patch rehash_pod.patch: applied upstream
* Update c_rehash-compat.patch to apply to new upstream version. This
undoes upstream's "-old" option and creates both the new and old again.
It now also does it for CRLs.
* Drop defaults.patch, applied upstream
* dgst_hmac.patch updated to apply to upstream version.
* engines-path.patch updated to apply to upstream version.
* Update list of exported symbols
* Update symbols files to require beta3
* Enable unit tests
* Add patch to add support for the no-ssl3-method option that completly
disable SSLv3 and pass the option. This drops the following functions
from the library: SSLv3_method, SSLv3_server_method and
SSLv3_client_method
* Build using OPENSSL_NO_BUF_FREELISTS
openssl (1.0.2~beta2-1) experimental; urgency=medium
* New usptream beta version
- Fix CVE-2014-0224
- Fix CVE-2014-0221
- Fix CVE-2014-0195
- Fix CVE-2014-3470
- Fix CVE-2014-0198
- Fix CVE-2010-5298
- Fix CVE-2014-0160
- Fix CVE-2014-0076
* Merge changes between 1.0.1f-1 and 1.0.1h-3:
- postinst: Updated check for restarting services
* libdoc-manpgs-pod-spell.patch and openssl-pod-misspell.patch
partially applied upstream
* Drop fix-pod-errors.patch, applied upstream.
* Add support for ppc64le (Closes: #745657)
* Add support for OpenRISC (Closes: #736772)
openssl (1.0.2~beta1-1) experimental; urgency=medium
* New upstream beta version
- Update list of symbols that should be exported and adjust the symbols
file. This also removes a bunch of duplicate symbols in the linker
file.
- Fix additional pod errors
- Following patches have been applied upstream and are removed:
libssl-misspell.patch, pod_req_misspell2.patch,
pod_pksc12.misspell.patch, pod_s_server.misspell.patch,
pod_x509setflags.misspell.patch, pod_ec.misspell.patch,
pkcs12-doc.patch, req_bits.patch
- Following patches have been partially applied upstream:
libdoc-manpgs-pod-spell.patch, openssl-pod-misspell.patch
- Remove openssl_fix_for_x32.patch, different patch applied upstream.
* Add support for cross compiling (Closes: #465248)
Date: Tue, 12 May 2015 11:36:12 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/openssl/1.0.2a-1ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 12 May 2015 11:36:12 -0400
Source: openssl
Binary: openssl libssl1.0.0 libcrypto1.0.0-udeb libssl1.0.0-udeb libssl-dev libssl-doc libssl1.0.0-dbg
Architecture: source
Version: 1.0.2a-1ubuntu1
Distribution: wily
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description:
libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets Layer toolkit - development documentation
libssl1.0.0 - Secure Sockets Layer toolkit - shared libraries
libssl1.0.0-dbg - Secure Sockets Layer toolkit - debug information
libssl1.0.0-udeb - ssl shared library - udeb (udeb)
openssl - Secure Sockets Layer toolkit - cryptographic utility
Closes: 465248 736772 745657
Changes:
openssl (1.0.2a-1ubuntu1) wily; urgency=medium
.
* Merge with Debian, remaining changes.
- debian/libssl1.0.0.postinst:
+ Display a system restart required notification on libssl1.0.0
upgrade on servers.
+ Use a different priority for libssl1.0.0/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
- debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
in Debian).
- debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
rules}: Move runtime libraries to /lib, for the benefit of
wpasupplicant.
- debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
.pc.
- debian/rules:
+ Don't run 'make test' when cross-building.
+ Use host compiler when cross-building. Patch from Neil Williams.
+ Don't build for processors no longer supported: i586 (on i386)
+ Fix Makefile to properly clean up libs/ dirs in clean target.
+ Replace duplicate files in the doc directory with symlinks.
- debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
- debian/rules: Enable optimized 64bit elliptic curve code contributed
by Google.
* Dropped patches included in new version:
- ppc64-support.patch, CVE-2014-0076.patch, CVE-2014-0160.patch,
CVE-2010-5298.patch, CVE-2014-0198.patch, CVE-2014-0195.patch,
CVE-2014-0221.patch, CVE-2014-0224-1.patch, CVE-2014-0224-2.patch,
CVE-2014-3470.patch, CVE-2014-0224-3.patch,
CVE-2014-0224-regression.patch, CVE-2014-0224-regression2.patch,
CVE-2014-3505.patch, CVE-2014-3506.patch, CVE-2014-3507.patch,
CVE-2014-3508.patch, CVE-2014-3509.patch, CVE-2014-3510.patch,
CVE-2014-3511.patch, CVE-2014-3512.patch, CVE-2014-5139.patch,
power8-optimisations.patch, tls_fallback_scsv_support.patch,
CVE-2014-3513.patch, CVE-2014-3567.patch, CVE-2014-3568.patch,
CVE-2014-3569.patch, CVE-2014-3570.patch, CVE-2014-3571-1.patch,
CVE-2014-3571-2.patch, CVE-2014-3572.patch, CVE-2014-8275.patch,
CVE-2015-0204.patch, CVE-2015-0205.patch, CVE-2015-0206.patch,
CVE-2015-0209.patch, CVE-2015-0286.patch, CVE-2015-0287.patch,
CVE-2015-0288.patch, CVE-2015-0289.patch, CVE-2015-0292.patch,
CVE-2015-0293.patch, CVE-2015-0209-2.patch, CVE-2015-0293-2.patch
.
openssl (1.0.2a-1) unstable; urgency=medium
.
* New upstrema version
- Fix CVE-2015-0286
- Fix CVE-2015-0287
- Fix CVE-2015-0289
- Fix CVE-2015-0293 (not affected, SSLv2 disabled)
- Fix CVE-2015-0209
- Fix CVE-2015-0288
- Fix CVE-2015-0291
- Fix CVE-2015-0290
- Fix CVE-2015-0207
- Fix CVE-2015-0208
- Fix CVE-2015-1787
- Fix CVE-2015-0285
* Temporary enable SSLv3 methods again, but they will go away.
* Don't set TERMIO anymore, use the default TERMIOS instead.
.
openssl (1.0.2-1) experimental; urgency=medium
.
* New upstream release
- Fixes CVE-2014-3571
- Fixes CVE-2015-0206
- Fixes CVE-2014-3569
- Fixes CVE-2014-3572
- Fixes CVE-2015-0204
- Fixes CVE-2015-0205
- Fixes CVE-2014-8275
- Fixes CVE-2014-3570
- Drop git_snapshot.patch
* Drop gnu_source.patch, dgst_hmac.patch, stddef.patch,
no_ssl3_method.patch: applied upstream
* Update patches to apply
.
openssl (1.0.2~beta3-1) experimental; urgency=low
.
* New usptream beta version
* Add git snapshot
* Merge changes between 1.0.1h-3 and 1.0.1j-1:
- Disables SSLv3 because of CVE-2014-3566
* Drop patch rehash-crt.patch: partially applied upstream.
c_rehash now doesn't support files in DER format anymore.
* Drop patch rehash_pod.patch: applied upstream
* Update c_rehash-compat.patch to apply to new upstream version. This
undoes upstream's "-old" option and creates both the new and old again.
It now also does it for CRLs.
* Drop defaults.patch, applied upstream
* dgst_hmac.patch updated to apply to upstream version.
* engines-path.patch updated to apply to upstream version.
* Update list of exported symbols
* Update symbols files to require beta3
* Enable unit tests
* Add patch to add support for the no-ssl3-method option that completly
disable SSLv3 and pass the option. This drops the following functions
from the library: SSLv3_method, SSLv3_server_method and
SSLv3_client_method
* Build using OPENSSL_NO_BUF_FREELISTS
.
openssl (1.0.2~beta2-1) experimental; urgency=medium
.
* New usptream beta version
- Fix CVE-2014-0224
- Fix CVE-2014-0221
- Fix CVE-2014-0195
- Fix CVE-2014-3470
- Fix CVE-2014-0198
- Fix CVE-2010-5298
- Fix CVE-2014-0160
- Fix CVE-2014-0076
* Merge changes between 1.0.1f-1 and 1.0.1h-3:
- postinst: Updated check for restarting services
* libdoc-manpgs-pod-spell.patch and openssl-pod-misspell.patch
partially applied upstream
* Drop fix-pod-errors.patch, applied upstream.
* Add support for ppc64le (Closes: #745657)
* Add support for OpenRISC (Closes: #736772)
.
openssl (1.0.2~beta1-1) experimental; urgency=medium
.
* New upstream beta version
- Update list of symbols that should be exported and adjust the symbols
file. This also removes a bunch of duplicate symbols in the linker
file.
- Fix additional pod errors
- Following patches have been applied upstream and are removed:
libssl-misspell.patch, pod_req_misspell2.patch,
pod_pksc12.misspell.patch, pod_s_server.misspell.patch,
pod_x509setflags.misspell.patch, pod_ec.misspell.patch,
pkcs12-doc.patch, req_bits.patch
- Following patches have been partially applied upstream:
libdoc-manpgs-pod-spell.patch, openssl-pod-misspell.patch
- Remove openssl_fix_for_x32.patch, different patch applied upstream.
* Add support for cross compiling (Closes: #465248)
Checksums-Sha1:
8b04ab860e4bb1d19efedfd8dc134d0f445613e3 2414 openssl_1.0.2a-1ubuntu1.dsc
46ecd325b8e587fa491f6bb02ad4a9fb9f382f5f 5262089 openssl_1.0.2a.orig.tar.gz
a49ea6f3a5284c9f3889245d7fb99fbf6d130303 85848 openssl_1.0.2a-1ubuntu1.debian.tar.xz
Checksums-Sha256:
d62c3830682157d4c0d97fab3aeade507bb045670fec0623b5b2b5dd840de658 2414 openssl_1.0.2a-1ubuntu1.dsc
15b6393c20030aab02c8e2fe0243cb1d1d18062f6c095d67bca91871dc7f324a 5262089 openssl_1.0.2a.orig.tar.gz
d3c8dd79db92e82835b73c5d9953127517e815a18b1e238acd7e15cc0df0a4de 85848 openssl_1.0.2a-1ubuntu1.debian.tar.xz
Files:
92c6fa87f7c2e20ee0ef18b2006d8756 2414 utils optional openssl_1.0.2a-1ubuntu1.dsc
a06c547dac9044161a477211049f60ef 5262089 utils optional openssl_1.0.2a.orig.tar.gz
971fd86ffc7112e6744f99d594a427cf 85848 utils optional openssl_1.0.2a-1ubuntu1.debian.tar.xz
Original-Maintainer: Debian OpenSSL Team <pkg-openssl-devel at lists.alioth.debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=1dBa
-----END PGP SIGNATURE-----
More information about the Wily-changes
mailing list