[ubuntu/impish-proposed] openssl 1.1.1l-1ubuntu1 (Accepted)

Simon Chopin simon.chopin at canonical.com
Fri Sep 10 08:33:13 UTC 2021


openssl (1.1.1l-1ubuntu1) impish; urgency=low

  * Merge from Debian unstable. Remaining changes:
    - Replace duplicate files in the doc directory with symlinks.
    - debian/libssl1.1.postinst:
      + Display a system restart required notification on libssl1.1
        upgrade on servers, unless needrestart is available.
      + Use a different priority for libssl1.1/restart-services depending
        on whether a desktop, or server dist-upgrade is being performed.
      + Skip services restart & reboot notification if needrestart is in-use.
      + Bump version check to to 1.1.1.
      + Import libraries/restart-without-asking template as used by above.
    - Revert "Enable system default config to enforce TLS1.2 as a
      minimum" & "Increase default security level from 1 to 2".
    - Reword the NEWS entry, as applicable on Ubuntu.
    - Cherrypick s390x SIMD acceleration patches for poly1305 and chacha20
      and ECC from master.
    - Use perl:native in the autopkgtest for installability on i386.
    - Set OPENSSL_TLS_SECURITY_LEVEL=2 as compiled-in minimum security
      level. Change meaning of SECURITY_LEVEL=2 to prohibit TLS versions
      below 1.2 and update documentation. Previous default of 1, can be set
      by calling SSL_CTX_set_security_level(), SSL_set_security_level() or
      using ':@SECLEVEL=1' CipherString value in openssl.cfg.
    - Import https://github.com/openssl/openssl/pull/12272.patch to enable
      CET.
    - Add support for building with noudeb build profile.
  * Dropped changes:
    - Cherry-pick an upstream patch to fix s390x AES code

openssl (1.1.1l-1) unstable; urgency=medium

  * New upstream version.
    - CVE-2021-3711 (SM2 Decryption Buffer Overflow).
    - CVE-2021-3712 (Read buffer overruns processing ASN.1 strings).

Date: Fri, 10 Sep 2021 09:59:56 +0200
Changed-By: Simon Chopin <simon.chopin at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Julian Andres Klode <julian.klode at canonical.com>
https://launchpad.net/ubuntu/+source/openssl/1.1.1l-1ubuntu1
-------------- next part --------------
Format: 1.8
Date: Fri, 10 Sep 2021 09:59:56 +0200
Source: openssl
Built-For-Profiles: noudeb
Architecture: source
Version: 1.1.1l-1ubuntu1
Distribution: impish
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Simon Chopin <simon.chopin at canonical.com>
Changes:
 openssl (1.1.1l-1ubuntu1) impish; urgency=low
 .
   * Merge from Debian unstable. Remaining changes:
     - Replace duplicate files in the doc directory with symlinks.
     - debian/libssl1.1.postinst:
       + Display a system restart required notification on libssl1.1
         upgrade on servers, unless needrestart is available.
       + Use a different priority for libssl1.1/restart-services depending
         on whether a desktop, or server dist-upgrade is being performed.
       + Skip services restart & reboot notification if needrestart is in-use.
       + Bump version check to to 1.1.1.
       + Import libraries/restart-without-asking template as used by above.
     - Revert "Enable system default config to enforce TLS1.2 as a
       minimum" & "Increase default security level from 1 to 2".
     - Reword the NEWS entry, as applicable on Ubuntu.
     - Cherrypick s390x SIMD acceleration patches for poly1305 and chacha20
       and ECC from master.
     - Use perl:native in the autopkgtest for installability on i386.
     - Set OPENSSL_TLS_SECURITY_LEVEL=2 as compiled-in minimum security
       level. Change meaning of SECURITY_LEVEL=2 to prohibit TLS versions
       below 1.2 and update documentation. Previous default of 1, can be set
       by calling SSL_CTX_set_security_level(), SSL_set_security_level() or
       using ':@SECLEVEL=1' CipherString value in openssl.cfg.
     - Import https://github.com/openssl/openssl/pull/12272.patch to enable
       CET.
     - Add support for building with noudeb build profile.
   * Dropped changes:
     - Cherry-pick an upstream patch to fix s390x AES code
 .
 openssl (1.1.1l-1) unstable; urgency=medium
 .
   * New upstream version.
     - CVE-2021-3711 (SM2 Decryption Buffer Overflow).
     - CVE-2021-3712 (Read buffer overruns processing ASN.1 strings).
Checksums-Sha1:
 9a8dac7984b6b39f829f10cb8f4f70fc21a8bb03 2758 openssl_1.1.1l-1ubuntu1.dsc
 f8819dd31642eebea6cc1fa5c256fc9a4f40809b 9834044 openssl_1.1.1l.orig.tar.gz
 1f13a8055c8c143a78e1f18aeae38b22cf3b18e4 488 openssl_1.1.1l.orig.tar.gz.asc
 24896898076ffab03de92d11fcca2b8c260fe374 144724 openssl_1.1.1l-1ubuntu1.debian.tar.xz
 e267142f9a7c66650331dc9b356c9db85de5b3ff 7706 openssl_1.1.1l-1ubuntu1_source.buildinfo
Checksums-Sha256:
 bd170ab313168ff7ddbe9ee8bf25084a7d8683daf99ecec383f2564c56d26a35 2758 openssl_1.1.1l-1ubuntu1.dsc
 0b7a3e5e59c34827fe0c3a74b7ec8baef302b98fa80088d7f9153aa16fa76bd1 9834044 openssl_1.1.1l.orig.tar.gz
 e2ae0ea526223843245dd80224b19a55283f4910dd56b7ee7b23187164f69fda 488 openssl_1.1.1l.orig.tar.gz.asc
 9845f9b19e1fd866babbcb28c93de74203ecb6f476fcb6418d29b60a2742e5b2 144724 openssl_1.1.1l-1ubuntu1.debian.tar.xz
 0f0a1916a056ee211135b0abfbbceeeb3565b776196d7fac48e10a25f739e654 7706 openssl_1.1.1l-1ubuntu1_source.buildinfo
Files:
 878c651fb9956fde705ccb340aa55242 2758 utils optional openssl_1.1.1l-1ubuntu1.dsc
 ac0d4387f3ba0ad741b0580dd45f6ff3 9834044 utils optional openssl_1.1.1l.orig.tar.gz
 dc5c52d7d1e7c2888351434789cdb89c 488 utils optional openssl_1.1.1l.orig.tar.gz.asc
 0663921b2560f1bffce83d443dde9f7f 144724 utils optional openssl_1.1.1l-1ubuntu1.debian.tar.xz
 fa4797aa37795d7744f1e8d0c7191cae 7706 utils optional openssl_1.1.1l-1ubuntu1_source.buildinfo
Original-Maintainer: Debian OpenSSL Team <pkg-openssl-devel at lists.alioth.debian.org>


More information about the impish-changes mailing list