[ubuntu/wily-proposed] openssl 1.0.2a-1ubuntu1 (Accepted)

Marc Deslauriers marc.deslauriers at ubuntu.com
Tue May 12 18:13:17 UTC 2015


openssl (1.0.2a-1ubuntu1) wily; urgency=medium

  * Merge with Debian, remaining changes.
    - debian/libssl1.0.0.postinst:
      + Display a system restart required notification on libssl1.0.0
        upgrade on servers.
      + Use a different priority for libssl1.0.0/restart-services depending
        on whether a desktop, or server dist-upgrade is being performed.
    - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
      libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
      in Debian).
    - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
      rules}: Move runtime libraries to /lib, for the benefit of
      wpasupplicant.
    - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
      .pc.
    - debian/rules:
      + Don't run 'make test' when cross-building.
      + Use host compiler when cross-building.  Patch from Neil Williams.
      + Don't build for processors no longer supported: i586 (on i386)
      + Fix Makefile to properly clean up libs/ dirs in clean target.
      + Replace duplicate files in the doc directory with symlinks.
    - debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
    - debian/rules: Enable optimized 64bit elliptic curve code contributed
      by Google.
  * Dropped patches included in new version:
    - ppc64-support.patch, CVE-2014-0076.patch, CVE-2014-0160.patch,
      CVE-2010-5298.patch, CVE-2014-0198.patch, CVE-2014-0195.patch,
      CVE-2014-0221.patch, CVE-2014-0224-1.patch, CVE-2014-0224-2.patch,
      CVE-2014-3470.patch, CVE-2014-0224-3.patch,
      CVE-2014-0224-regression.patch, CVE-2014-0224-regression2.patch,
      CVE-2014-3505.patch, CVE-2014-3506.patch, CVE-2014-3507.patch,
      CVE-2014-3508.patch, CVE-2014-3509.patch, CVE-2014-3510.patch,
      CVE-2014-3511.patch, CVE-2014-3512.patch, CVE-2014-5139.patch,
      power8-optimisations.patch, tls_fallback_scsv_support.patch,
      CVE-2014-3513.patch, CVE-2014-3567.patch, CVE-2014-3568.patch,
      CVE-2014-3569.patch, CVE-2014-3570.patch, CVE-2014-3571-1.patch,
      CVE-2014-3571-2.patch, CVE-2014-3572.patch, CVE-2014-8275.patch,
      CVE-2015-0204.patch, CVE-2015-0205.patch, CVE-2015-0206.patch,
      CVE-2015-0209.patch, CVE-2015-0286.patch, CVE-2015-0287.patch,
      CVE-2015-0288.patch, CVE-2015-0289.patch, CVE-2015-0292.patch,
      CVE-2015-0293.patch, CVE-2015-0209-2.patch, CVE-2015-0293-2.patch

openssl (1.0.2a-1) unstable; urgency=medium

  * New upstrema version
    - Fix CVE-2015-0286
    - Fix CVE-2015-0287
    - Fix CVE-2015-0289
    - Fix CVE-2015-0293 (not affected, SSLv2 disabled)
    - Fix CVE-2015-0209
    - Fix CVE-2015-0288
    - Fix CVE-2015-0291
    - Fix CVE-2015-0290
    - Fix CVE-2015-0207
    - Fix CVE-2015-0208
    - Fix CVE-2015-1787
    - Fix CVE-2015-0285
  * Temporary enable SSLv3 methods again, but they will go away.
  * Don't set TERMIO anymore, use the default TERMIOS instead.

openssl (1.0.2-1) experimental; urgency=medium

  * New upstream release
    - Fixes CVE-2014-3571
    - Fixes CVE-2015-0206
    - Fixes CVE-2014-3569
    - Fixes CVE-2014-3572
    - Fixes CVE-2015-0204
    - Fixes CVE-2015-0205
    - Fixes CVE-2014-8275
    - Fixes CVE-2014-3570
    - Drop git_snapshot.patch
  * Drop gnu_source.patch, dgst_hmac.patch, stddef.patch,
    no_ssl3_method.patch: applied upstream
  * Update patches to apply

openssl (1.0.2~beta3-1) experimental; urgency=low

  * New usptream beta version
  * Add git snapshot
  * Merge changes between 1.0.1h-3 and 1.0.1j-1:
    - Disables SSLv3 because of CVE-2014-3566
  * Drop patch rehash-crt.patch: partially applied upstream.
    c_rehash now doesn't support files in DER format anymore.
  * Drop patch rehash_pod.patch: applied upstream
  * Update c_rehash-compat.patch to apply to new upstream version.  This
    undoes upstream's "-old" option and creates both the new and old again.
    It now also does it for CRLs.
  * Drop defaults.patch, applied upstream
  * dgst_hmac.patch updated to apply to upstream version.
  * engines-path.patch updated to apply to upstream version.
  * Update list of exported symbols
  * Update symbols files to require beta3
  * Enable unit tests
  * Add patch to add support for the no-ssl3-method option that completly
    disable SSLv3 and pass the option.  This drops the following functions
    from the library: SSLv3_method, SSLv3_server_method and
    SSLv3_client_method
  * Build using OPENSSL_NO_BUF_FREELISTS

openssl (1.0.2~beta2-1) experimental; urgency=medium

  * New usptream beta version
    - Fix CVE-2014-0224
    - Fix CVE-2014-0221
    - Fix CVE-2014-0195
    - Fix CVE-2014-3470
    - Fix CVE-2014-0198
    - Fix CVE-2010-5298
    - Fix CVE-2014-0160
    - Fix CVE-2014-0076
  * Merge changes between 1.0.1f-1 and 1.0.1h-3:
    - postinst: Updated check for restarting services
  * libdoc-manpgs-pod-spell.patch and openssl-pod-misspell.patch
    partially applied upstream
  * Drop fix-pod-errors.patch, applied upstream.
  * Add support for ppc64le (Closes: #745657)
  * Add support for OpenRISC (Closes: #736772)

openssl (1.0.2~beta1-1) experimental; urgency=medium

  * New upstream beta version
    - Update list of symbols that should be exported and adjust the symbols
      file.  This also removes a bunch of duplicate symbols in the linker
      file.
    - Fix additional pod errors
    - Following patches have been applied upstream and are removed:
      libssl-misspell.patch, pod_req_misspell2.patch,
      pod_pksc12.misspell.patch, pod_s_server.misspell.patch,
      pod_x509setflags.misspell.patch, pod_ec.misspell.patch,
      pkcs12-doc.patch, req_bits.patch
    - Following patches have been partially applied upstream:
      libdoc-manpgs-pod-spell.patch, openssl-pod-misspell.patch
    - Remove openssl_fix_for_x32.patch, different patch applied upstream.
  * Add support for cross compiling (Closes: #465248)

Date: Tue, 12 May 2015 11:36:12 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/openssl/1.0.2a-1ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 12 May 2015 11:36:12 -0400
Source: openssl
Binary: openssl libssl1.0.0 libcrypto1.0.0-udeb libssl1.0.0-udeb libssl-dev libssl-doc libssl1.0.0-dbg
Architecture: source
Version: 1.0.2a-1ubuntu1
Distribution: wily
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description:
 libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
 libssl-dev - Secure Sockets Layer toolkit - development files
 libssl-doc - Secure Sockets Layer toolkit - development documentation
 libssl1.0.0 - Secure Sockets Layer toolkit - shared libraries
 libssl1.0.0-dbg - Secure Sockets Layer toolkit - debug information
 libssl1.0.0-udeb - ssl shared library - udeb (udeb)
 openssl    - Secure Sockets Layer toolkit - cryptographic utility
Closes: 465248 736772 745657
Changes:
 openssl (1.0.2a-1ubuntu1) wily; urgency=medium
 .
   * Merge with Debian, remaining changes.
     - debian/libssl1.0.0.postinst:
       + Display a system restart required notification on libssl1.0.0
         upgrade on servers.
       + Use a different priority for libssl1.0.0/restart-services depending
         on whether a desktop, or server dist-upgrade is being performed.
     - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
       libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
       in Debian).
     - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
       rules}: Move runtime libraries to /lib, for the benefit of
       wpasupplicant.
     - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
       .pc.
     - debian/rules:
       + Don't run 'make test' when cross-building.
       + Use host compiler when cross-building.  Patch from Neil Williams.
       + Don't build for processors no longer supported: i586 (on i386)
       + Fix Makefile to properly clean up libs/ dirs in clean target.
       + Replace duplicate files in the doc directory with symlinks.
     - debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
     - debian/rules: Enable optimized 64bit elliptic curve code contributed
       by Google.
   * Dropped patches included in new version:
     - ppc64-support.patch, CVE-2014-0076.patch, CVE-2014-0160.patch,
       CVE-2010-5298.patch, CVE-2014-0198.patch, CVE-2014-0195.patch,
       CVE-2014-0221.patch, CVE-2014-0224-1.patch, CVE-2014-0224-2.patch,
       CVE-2014-3470.patch, CVE-2014-0224-3.patch,
       CVE-2014-0224-regression.patch, CVE-2014-0224-regression2.patch,
       CVE-2014-3505.patch, CVE-2014-3506.patch, CVE-2014-3507.patch,
       CVE-2014-3508.patch, CVE-2014-3509.patch, CVE-2014-3510.patch,
       CVE-2014-3511.patch, CVE-2014-3512.patch, CVE-2014-5139.patch,
       power8-optimisations.patch, tls_fallback_scsv_support.patch,
       CVE-2014-3513.patch, CVE-2014-3567.patch, CVE-2014-3568.patch,
       CVE-2014-3569.patch, CVE-2014-3570.patch, CVE-2014-3571-1.patch,
       CVE-2014-3571-2.patch, CVE-2014-3572.patch, CVE-2014-8275.patch,
       CVE-2015-0204.patch, CVE-2015-0205.patch, CVE-2015-0206.patch,
       CVE-2015-0209.patch, CVE-2015-0286.patch, CVE-2015-0287.patch,
       CVE-2015-0288.patch, CVE-2015-0289.patch, CVE-2015-0292.patch,
       CVE-2015-0293.patch, CVE-2015-0209-2.patch, CVE-2015-0293-2.patch
 .
 openssl (1.0.2a-1) unstable; urgency=medium
 .
   * New upstrema version
     - Fix CVE-2015-0286
     - Fix CVE-2015-0287
     - Fix CVE-2015-0289
     - Fix CVE-2015-0293 (not affected, SSLv2 disabled)
     - Fix CVE-2015-0209
     - Fix CVE-2015-0288
     - Fix CVE-2015-0291
     - Fix CVE-2015-0290
     - Fix CVE-2015-0207
     - Fix CVE-2015-0208
     - Fix CVE-2015-1787
     - Fix CVE-2015-0285
   * Temporary enable SSLv3 methods again, but they will go away.
   * Don't set TERMIO anymore, use the default TERMIOS instead.
 .
 openssl (1.0.2-1) experimental; urgency=medium
 .
   * New upstream release
     - Fixes CVE-2014-3571
     - Fixes CVE-2015-0206
     - Fixes CVE-2014-3569
     - Fixes CVE-2014-3572
     - Fixes CVE-2015-0204
     - Fixes CVE-2015-0205
     - Fixes CVE-2014-8275
     - Fixes CVE-2014-3570
     - Drop git_snapshot.patch
   * Drop gnu_source.patch, dgst_hmac.patch, stddef.patch,
     no_ssl3_method.patch: applied upstream
   * Update patches to apply
 .
 openssl (1.0.2~beta3-1) experimental; urgency=low
 .
   * New usptream beta version
   * Add git snapshot
   * Merge changes between 1.0.1h-3 and 1.0.1j-1:
     - Disables SSLv3 because of CVE-2014-3566
   * Drop patch rehash-crt.patch: partially applied upstream.
     c_rehash now doesn't support files in DER format anymore.
   * Drop patch rehash_pod.patch: applied upstream
   * Update c_rehash-compat.patch to apply to new upstream version.  This
     undoes upstream's "-old" option and creates both the new and old again.
     It now also does it for CRLs.
   * Drop defaults.patch, applied upstream
   * dgst_hmac.patch updated to apply to upstream version.
   * engines-path.patch updated to apply to upstream version.
   * Update list of exported symbols
   * Update symbols files to require beta3
   * Enable unit tests
   * Add patch to add support for the no-ssl3-method option that completly
     disable SSLv3 and pass the option.  This drops the following functions
     from the library: SSLv3_method, SSLv3_server_method and
     SSLv3_client_method
   * Build using OPENSSL_NO_BUF_FREELISTS
 .
 openssl (1.0.2~beta2-1) experimental; urgency=medium
 .
   * New usptream beta version
     - Fix CVE-2014-0224
     - Fix CVE-2014-0221
     - Fix CVE-2014-0195
     - Fix CVE-2014-3470
     - Fix CVE-2014-0198
     - Fix CVE-2010-5298
     - Fix CVE-2014-0160
     - Fix CVE-2014-0076
   * Merge changes between 1.0.1f-1 and 1.0.1h-3:
     - postinst: Updated check for restarting services
   * libdoc-manpgs-pod-spell.patch and openssl-pod-misspell.patch
     partially applied upstream
   * Drop fix-pod-errors.patch, applied upstream.
   * Add support for ppc64le (Closes: #745657)
   * Add support for OpenRISC (Closes: #736772)
 .
 openssl (1.0.2~beta1-1) experimental; urgency=medium
 .
   * New upstream beta version
     - Update list of symbols that should be exported and adjust the symbols
       file.  This also removes a bunch of duplicate symbols in the linker
       file.
     - Fix additional pod errors
     - Following patches have been applied upstream and are removed:
       libssl-misspell.patch, pod_req_misspell2.patch,
       pod_pksc12.misspell.patch, pod_s_server.misspell.patch,
       pod_x509setflags.misspell.patch, pod_ec.misspell.patch,
       pkcs12-doc.patch, req_bits.patch
     - Following patches have been partially applied upstream:
       libdoc-manpgs-pod-spell.patch, openssl-pod-misspell.patch
     - Remove openssl_fix_for_x32.patch, different patch applied upstream.
   * Add support for cross compiling (Closes: #465248)
Checksums-Sha1:
 8b04ab860e4bb1d19efedfd8dc134d0f445613e3 2414 openssl_1.0.2a-1ubuntu1.dsc
 46ecd325b8e587fa491f6bb02ad4a9fb9f382f5f 5262089 openssl_1.0.2a.orig.tar.gz
 a49ea6f3a5284c9f3889245d7fb99fbf6d130303 85848 openssl_1.0.2a-1ubuntu1.debian.tar.xz
Checksums-Sha256:
 d62c3830682157d4c0d97fab3aeade507bb045670fec0623b5b2b5dd840de658 2414 openssl_1.0.2a-1ubuntu1.dsc
 15b6393c20030aab02c8e2fe0243cb1d1d18062f6c095d67bca91871dc7f324a 5262089 openssl_1.0.2a.orig.tar.gz
 d3c8dd79db92e82835b73c5d9953127517e815a18b1e238acd7e15cc0df0a4de 85848 openssl_1.0.2a-1ubuntu1.debian.tar.xz
Files:
 92c6fa87f7c2e20ee0ef18b2006d8756 2414 utils optional openssl_1.0.2a-1ubuntu1.dsc
 a06c547dac9044161a477211049f60ef 5262089 utils optional openssl_1.0.2a.orig.tar.gz
 971fd86ffc7112e6744f99d594a427cf 85848 utils optional openssl_1.0.2a-1ubuntu1.debian.tar.xz
Original-Maintainer: Debian OpenSSL Team <pkg-openssl-devel at lists.alioth.debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCgAGBQJVUkGKAAoJEGVp2FWnRL6T/gEP/3i5laaHRICgYzi4P7gDUz9q
bD+riq17La2ugnqel4btGP/QWFWtM31FT450lokMDD2kfYJXc4DFtnO2lXs8R8le
lcmBLi6Y4XwCVMl86l0V18/Y+TpTw2rU39cZiUS2b05dJzw+HVuN/6DtP4o47DbM
+g4T7/1XcPaBTiJQcrYKf7bVxFt93Pxov22h4ei19HB+NY4rEiCmmr+GFbYQIFAn
pKx5hbQIx6mAkjad9Osh44OIslW7+T808HQESWVvIqXbx7Zgd6RddN6a578gjwcx
CqsDLebeeOk8IsHTa6l0f/aPOsQUPRXLFsMLxyQvZBaohS3OAjJFHJ5ywmyj7VJk
ILNOPMVz+2IOAUMoXXEzcYyDGLXF8mda2rseay36OAu2/Nv85QHf2vm8I2a9LtuO
tpWhCrQocH1B+NgF0iRT27GE4chWKLdCbTHOi8TkDnFvK3ZOcI4LebcMqHJ8ficu
xpBfWDmHvOBf5G3Lev30ocGbwps9qjjnqieATfjTYjecXLwv5tWvgWvbWWM/Cosj
PwPepvvmPv6xVkbhD3xJZjN3gYkKN0vaHYAcP/x/dzIEmShe3C0XLKUM1gidcTdA
1vRLLJqVR/7cr8rL/KqMdygB4VaqrjaiTDvUwUoFyXU9ow/cLVvua4lT9oi2xHO6
6VJ6ySZHUR8HddUwAHge
=1dBa
-----END PGP SIGNATURE-----


More information about the Wily-changes mailing list