[ubuntu/jaunty] openssl 0.9.8g-14ubuntu1 (Accepted)

Scott James Remnant scott at ubuntu.com
Tue Nov 11 17:35:13 GMT 2008


openssl (0.9.8g-14ubuntu1) jaunty; urgency=low

  * Merge from debian unstable, remaining changes:
    - Link using -Bsymbolic-functions
    - Add support for lpia
    - Disable SSLv2 during compile
    - Ship documentation in openssl-doc, suggested by the package.
    - Use a different priority for libssl0.9.8/restart-services
      depending on whether a desktop, or server dist-upgrade is being
      performed.
    - Display a system restart required notification bubble on libssl0.9.8
      upgrade.
    - Replace duplicate files in the doc directory with symlinks.

openssl (0.9.8g-14) unstable; urgency=low

  * Don't give the warning about security updates when upgrading
    from etch since it doesn't have any known security problems.
  * Automaticly use engines that succesfully initialised.  Patch
    from the 0.9.8h upstream version.  (Closes: #502177)

openssl (0.9.8g-13) unstable; urgency=low

  * Fix a problem with tlsext preventing firefox 3 from connection.
    Patch from upstream CVS and part of 0.9.8h.
    (Closes: #492758)

openssl (0.9.8g-12) unstable; urgency=low

  * add the changelog of the 10.1 NMU to make bugtracking happy

openssl (0.9.8g-11) unstable; urgency=low

  [ Christoph Martin ]
  * updated cs, gl, sv, ru, ro debconf translation (closes: #480926, #480967,
    #482465, #484324, #488595)
  * add Vcs-Svn header (closes: #481654)
  * fix debian-kfreebsd-i386 build flags (closes: #482275)
  * add stunnel4 to restart list (closes: #482111)
  * include fixes from 10.1 NMU by Security team
    - Fix double free in TLS server name extension which leads to a remote
      denial of service (CVE-2008-0891; Closes: #483379).
    - Fix denial of service if the 'Server Key exchange message'
      is omitted from a TLS handshake which could lead to a client
      crash (CVE-2008-1672; Closes: #483379).
      This only works if openssl is compiled with enable-tlsext which is
      done in Debian.
  * fix some lintian warnings
  * update to newest standards version

Date: Tue, 11 Nov 2008 17:24:44 +0000
Changed-By: Scott James Remnant <scott at ubuntu.com>
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Scott James Remnant <scott at canonical.com>
https://launchpad.net/ubuntu/jaunty/+source/openssl/0.9.8g-14ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Tue, 11 Nov 2008 17:24:44 +0000
Source: openssl
Binary: openssl openssl-doc libssl0.9.8 libcrypto0.9.8-udeb libssl-dev libssl0.9.8-dbg
Architecture: source
Version: 0.9.8g-14ubuntu1
Distribution: jaunty
Urgency: low
Maintainer: Ubuntu Core Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Scott James Remnant <scott at ubuntu.com>
Description: 
 libcrypto0.9.8-udeb - crypto shared library - udeb (udeb)
 libssl-dev - SSL development libraries, header files and documentation
 libssl0.9.8 - SSL shared libraries
 libssl0.9.8-dbg - Symbol tables for libssl and libcrypto
 openssl    - Secure Socket Layer (SSL) binary and related cryptographic tools
 openssl-doc - Secure Socket Layer (SSL) documentation
Closes: 480926 480967 481654 482111 482275 482465 483379 483379 484324 488595 492758 502177
Changes: 
 openssl (0.9.8g-14ubuntu1) jaunty; urgency=low
 .
   * Merge from debian unstable, remaining changes:
     - Link using -Bsymbolic-functions
     - Add support for lpia
     - Disable SSLv2 during compile
     - Ship documentation in openssl-doc, suggested by the package.
     - Use a different priority for libssl0.9.8/restart-services
       depending on whether a desktop, or server dist-upgrade is being
       performed.
     - Display a system restart required notification bubble on libssl0.9.8
       upgrade.
     - Replace duplicate files in the doc directory with symlinks.
 .
 openssl (0.9.8g-14) unstable; urgency=low
 .
   * Don't give the warning about security updates when upgrading
     from etch since it doesn't have any known security problems.
   * Automaticly use engines that succesfully initialised.  Patch
     from the 0.9.8h upstream version.  (Closes: #502177)
 .
 openssl (0.9.8g-13) unstable; urgency=low
 .
   * Fix a problem with tlsext preventing firefox 3 from connection.
     Patch from upstream CVS and part of 0.9.8h.
     (Closes: #492758)
 .
 openssl (0.9.8g-12) unstable; urgency=low
 .
   * add the changelog of the 10.1 NMU to make bugtracking happy
 .
 openssl (0.9.8g-11) unstable; urgency=low
 .
   [ Christoph Martin ]
   * updated cs, gl, sv, ru, ro debconf translation (closes: #480926, #480967,
     #482465, #484324, #488595)
   * add Vcs-Svn header (closes: #481654)
   * fix debian-kfreebsd-i386 build flags (closes: #482275)
   * add stunnel4 to restart list (closes: #482111)
   * include fixes from 10.1 NMU by Security team
     - Fix double free in TLS server name extension which leads to a remote
       denial of service (CVE-2008-0891; Closes: #483379).
     - Fix denial of service if the 'Server Key exchange message'
       is omitted from a TLS handshake which could lead to a client
       crash (CVE-2008-1672; Closes: #483379).
       This only works if openssl is compiled with enable-tlsext which is
       done in Debian.
   * fix some lintian warnings
   * update to newest standards version
Checksums-Sha1: 
 816361cd9df44aec0e4ac57aac0d9437e57511eb 1429 openssl_0.9.8g-14ubuntu1.dsc
 485b465d26256cccde03500f4ba27935d7dd5f6c 56133 openssl_0.9.8g-14ubuntu1.diff.gz
Checksums-Sha256: 
 94fd58a2e6007695f4514835d51e3af776e782a2f6ebd8b4369d4da23bf9be08 1429 openssl_0.9.8g-14ubuntu1.dsc
 2cd621f082d3dbe3c2d1b447f9530b74ecae82c6740baa490e2b7efe68c5c530 56133 openssl_0.9.8g-14ubuntu1.diff.gz
Files: 
 16001cb739ed2f3aa59357b98fa6d6d0 1429 utils optional openssl_0.9.8g-14ubuntu1.dsc
 3cdbecf630d4a39fd4c6afedd7379ed8 56133 utils optional openssl_0.9.8g-14ubuntu1.diff.gz
Original-Maintainer: Debian OpenSSL Team <pkg-openssl-devel at lists.alioth.debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkZwgUACgkQSnQiFMl4yK6nlQCcC2kJQ+RdAGcygMNSZtwZZRTH
6Y0AnRLBc3IZkoRfY0tlFmJt9s/W3Z1e
=a0EP
-----END PGP SIGNATURE-----


More information about the Jaunty-changes mailing list