[ubuntu/jaunty] openssl 0.9.8g-14ubuntu1 (Accepted)
Scott James Remnant
scott at ubuntu.com
Tue Nov 11 17:35:13 GMT 2008
openssl (0.9.8g-14ubuntu1) jaunty; urgency=low
* Merge from debian unstable, remaining changes:
- Link using -Bsymbolic-functions
- Add support for lpia
- Disable SSLv2 during compile
- Ship documentation in openssl-doc, suggested by the package.
- Use a different priority for libssl0.9.8/restart-services
depending on whether a desktop, or server dist-upgrade is being
performed.
- Display a system restart required notification bubble on libssl0.9.8
upgrade.
- Replace duplicate files in the doc directory with symlinks.
openssl (0.9.8g-14) unstable; urgency=low
* Don't give the warning about security updates when upgrading
from etch since it doesn't have any known security problems.
* Automaticly use engines that succesfully initialised. Patch
from the 0.9.8h upstream version. (Closes: #502177)
openssl (0.9.8g-13) unstable; urgency=low
* Fix a problem with tlsext preventing firefox 3 from connection.
Patch from upstream CVS and part of 0.9.8h.
(Closes: #492758)
openssl (0.9.8g-12) unstable; urgency=low
* add the changelog of the 10.1 NMU to make bugtracking happy
openssl (0.9.8g-11) unstable; urgency=low
[ Christoph Martin ]
* updated cs, gl, sv, ru, ro debconf translation (closes: #480926, #480967,
#482465, #484324, #488595)
* add Vcs-Svn header (closes: #481654)
* fix debian-kfreebsd-i386 build flags (closes: #482275)
* add stunnel4 to restart list (closes: #482111)
* include fixes from 10.1 NMU by Security team
- Fix double free in TLS server name extension which leads to a remote
denial of service (CVE-2008-0891; Closes: #483379).
- Fix denial of service if the 'Server Key exchange message'
is omitted from a TLS handshake which could lead to a client
crash (CVE-2008-1672; Closes: #483379).
This only works if openssl is compiled with enable-tlsext which is
done in Debian.
* fix some lintian warnings
* update to newest standards version
Date: Tue, 11 Nov 2008 17:24:44 +0000
Changed-By: Scott James Remnant <scott at ubuntu.com>
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Scott James Remnant <scott at canonical.com>
https://launchpad.net/ubuntu/jaunty/+source/openssl/0.9.8g-14ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Tue, 11 Nov 2008 17:24:44 +0000
Source: openssl
Binary: openssl openssl-doc libssl0.9.8 libcrypto0.9.8-udeb libssl-dev libssl0.9.8-dbg
Architecture: source
Version: 0.9.8g-14ubuntu1
Distribution: jaunty
Urgency: low
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Scott James Remnant <scott at ubuntu.com>
Description:
libcrypto0.9.8-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl0.9.8 - SSL shared libraries
libssl0.9.8-dbg - Symbol tables for libssl and libcrypto
openssl - Secure Socket Layer (SSL) binary and related cryptographic tools
openssl-doc - Secure Socket Layer (SSL) documentation
Closes: 480926 480967 481654 482111 482275 482465 483379 483379 484324 488595 492758 502177
Changes:
openssl (0.9.8g-14ubuntu1) jaunty; urgency=low
.
* Merge from debian unstable, remaining changes:
- Link using -Bsymbolic-functions
- Add support for lpia
- Disable SSLv2 during compile
- Ship documentation in openssl-doc, suggested by the package.
- Use a different priority for libssl0.9.8/restart-services
depending on whether a desktop, or server dist-upgrade is being
performed.
- Display a system restart required notification bubble on libssl0.9.8
upgrade.
- Replace duplicate files in the doc directory with symlinks.
.
openssl (0.9.8g-14) unstable; urgency=low
.
* Don't give the warning about security updates when upgrading
from etch since it doesn't have any known security problems.
* Automaticly use engines that succesfully initialised. Patch
from the 0.9.8h upstream version. (Closes: #502177)
.
openssl (0.9.8g-13) unstable; urgency=low
.
* Fix a problem with tlsext preventing firefox 3 from connection.
Patch from upstream CVS and part of 0.9.8h.
(Closes: #492758)
.
openssl (0.9.8g-12) unstable; urgency=low
.
* add the changelog of the 10.1 NMU to make bugtracking happy
.
openssl (0.9.8g-11) unstable; urgency=low
.
[ Christoph Martin ]
* updated cs, gl, sv, ru, ro debconf translation (closes: #480926, #480967,
#482465, #484324, #488595)
* add Vcs-Svn header (closes: #481654)
* fix debian-kfreebsd-i386 build flags (closes: #482275)
* add stunnel4 to restart list (closes: #482111)
* include fixes from 10.1 NMU by Security team
- Fix double free in TLS server name extension which leads to a remote
denial of service (CVE-2008-0891; Closes: #483379).
- Fix denial of service if the 'Server Key exchange message'
is omitted from a TLS handshake which could lead to a client
crash (CVE-2008-1672; Closes: #483379).
This only works if openssl is compiled with enable-tlsext which is
done in Debian.
* fix some lintian warnings
* update to newest standards version
Checksums-Sha1:
816361cd9df44aec0e4ac57aac0d9437e57511eb 1429 openssl_0.9.8g-14ubuntu1.dsc
485b465d26256cccde03500f4ba27935d7dd5f6c 56133 openssl_0.9.8g-14ubuntu1.diff.gz
Checksums-Sha256:
94fd58a2e6007695f4514835d51e3af776e782a2f6ebd8b4369d4da23bf9be08 1429 openssl_0.9.8g-14ubuntu1.dsc
2cd621f082d3dbe3c2d1b447f9530b74ecae82c6740baa490e2b7efe68c5c530 56133 openssl_0.9.8g-14ubuntu1.diff.gz
Files:
16001cb739ed2f3aa59357b98fa6d6d0 1429 utils optional openssl_0.9.8g-14ubuntu1.dsc
3cdbecf630d4a39fd4c6afedd7379ed8 56133 utils optional openssl_0.9.8g-14ubuntu1.diff.gz
Original-Maintainer: Debian OpenSSL Team <pkg-openssl-devel at lists.alioth.debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkkZwgUACgkQSnQiFMl4yK6nlQCcC2kJQ+RdAGcygMNSZtwZZRTH
6Y0AnRLBc3IZkoRfY0tlFmJt9s/W3Z1e
=a0EP
-----END PGP SIGNATURE-----
More information about the Jaunty-changes
mailing list