[ubuntu/saucy-proposed] openssl 1.0.1e-2ubuntu1 (Accepted)
Marc Deslauriers
marc.deslauriers at ubuntu.com
Wed May 22 15:15:16 UTC 2013
openssl (1.0.1e-2ubuntu1) saucy; urgency=low
* Resynchronise with Debian unstable. Remaining changes:
- debian/libssl1.0.0.postinst:
+ Display a system restart required notification on libssl1.0.0
upgrade on servers.
+ Use a different priority for libssl1.0.0/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
- debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
in Debian).
- debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
rules}: Move runtime libraries to /lib, for the benefit of
wpasupplicant.
- debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
.pc.
- debian/rules:
+ Don't run 'make test' when cross-building.
+ Use host compiler when cross-building. Patch from Neil Williams.
+ Don't build for processors no longer supported: i586 (on i386)
+ Fix Makefile to properly clean up libs/ dirs in clean target.
+ Replace duplicate files in the doc directory with symlinks.
- Unapply patch c_rehash-multi and comment it out in the series as it
breaks parsing of certificates with CRLF line endings and other cases
(see Debian #642314 for discussion), it also changes the semantics of
c_rehash directories by requiring applications to parse hash link
targets as files containing potentially *multiple* certificates rather
than exactly one.
- debian/patches/tls12_workarounds.patch: Workaround large client hello
issues when TLS 1.1 and lower is in use
- debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
- debian/patches/ubuntu_deb676533_arm_asm.patch: Enable arm assembly
code.
- debian/patches/arm64-support: Add basic arm64 support (no assembler)
- debian/rules: Enable optimized 64bit elliptic curve code contributed
by Google.
* debian/patches/tls12_workarounds.patch: updated to also disable TLS 1.2
in test suite since we disable it in the client.
* Dropped changes:
- debian/patches/CVE-2013-0169.patch: upstream.
- debian/patches/fix_key_decoding_deadlock.patch: upstream.
- debian/patches/CVE-2013-0166.patch: upstream.
openssl (1.0.1e-2) unstable; urgency=high
* Bump shlibs. It's needed for the udeb.
* Make cpuid work on cpu's that don't set ecx (Closes: #699692)
* Fix problem with AES-NI causing bad record mac (Closes: #701868, #702635, #678353)
* Fix problem with DTLS version check (Closes: #701826)
* Fix segfault in SSL_get_certificate (Closes: #703031)
openssl (1.0.1e-1) unstable; urgency=high
* New upstream version (Closes: #699889)
- Fixes CVE-2013-0169, CVE-2012-2686, CVE-2013-0166
- Drop renegiotate_tls.patch, applied upstream
- Export new CRYPTO_memcmp symbol, update symbol file
* Add ssltest_no_sslv2.patch so that "make test" works.
openssl (1.0.1c-5) unstable; urgency=low
* Re-enable assembler versions on sparc. They shouldn't have
been disabled for sparc v9. (Closes: #649841)
Date: Tue, 21 May 2013 16:31:47 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/saucy/+source/openssl/1.0.1e-2ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 21 May 2013 16:31:47 -0400
Source: openssl
Binary: openssl libssl1.0.0 libcrypto1.0.0-udeb libssl1.0.0-udeb libssl-dev libssl-doc libssl1.0.0-dbg
Architecture: source
Version: 1.0.1e-2ubuntu1
Distribution: saucy
Urgency: high
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description:
libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl-doc - SSL development documentation documentation
libssl1.0.0 - SSL shared libraries
libssl1.0.0-dbg - Symbol tables for libssl and libcrypto
libssl1.0.0-udeb - ssl shared library - udeb (udeb)
openssl - Secure Socket Layer (SSL) binary and related cryptographic tools
Closes: 649841 678353 699692 699889 701826 701868 702635 703031
Changes:
openssl (1.0.1e-2ubuntu1) saucy; urgency=low
.
* Resynchronise with Debian unstable. Remaining changes:
- debian/libssl1.0.0.postinst:
+ Display a system restart required notification on libssl1.0.0
upgrade on servers.
+ Use a different priority for libssl1.0.0/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
- debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
in Debian).
- debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
rules}: Move runtime libraries to /lib, for the benefit of
wpasupplicant.
- debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
.pc.
- debian/rules:
+ Don't run 'make test' when cross-building.
+ Use host compiler when cross-building. Patch from Neil Williams.
+ Don't build for processors no longer supported: i586 (on i386)
+ Fix Makefile to properly clean up libs/ dirs in clean target.
+ Replace duplicate files in the doc directory with symlinks.
- Unapply patch c_rehash-multi and comment it out in the series as it
breaks parsing of certificates with CRLF line endings and other cases
(see Debian #642314 for discussion), it also changes the semantics of
c_rehash directories by requiring applications to parse hash link
targets as files containing potentially *multiple* certificates rather
than exactly one.
- debian/patches/tls12_workarounds.patch: Workaround large client hello
issues when TLS 1.1 and lower is in use
- debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
- debian/patches/ubuntu_deb676533_arm_asm.patch: Enable arm assembly
code.
- debian/patches/arm64-support: Add basic arm64 support (no assembler)
- debian/rules: Enable optimized 64bit elliptic curve code contributed
by Google.
* debian/patches/tls12_workarounds.patch: updated to also disable TLS 1.2
in test suite since we disable it in the client.
* Dropped changes:
- debian/patches/CVE-2013-0169.patch: upstream.
- debian/patches/fix_key_decoding_deadlock.patch: upstream.
- debian/patches/CVE-2013-0166.patch: upstream.
.
openssl (1.0.1e-2) unstable; urgency=high
.
* Bump shlibs. It's needed for the udeb.
* Make cpuid work on cpu's that don't set ecx (Closes: #699692)
* Fix problem with AES-NI causing bad record mac (Closes: #701868, #702635, #678353)
* Fix problem with DTLS version check (Closes: #701826)
* Fix segfault in SSL_get_certificate (Closes: #703031)
.
openssl (1.0.1e-1) unstable; urgency=high
.
* New upstream version (Closes: #699889)
- Fixes CVE-2013-0169, CVE-2012-2686, CVE-2013-0166
- Drop renegiotate_tls.patch, applied upstream
- Export new CRYPTO_memcmp symbol, update symbol file
* Add ssltest_no_sslv2.patch so that "make test" works.
.
openssl (1.0.1c-5) unstable; urgency=low
.
* Re-enable assembler versions on sparc. They shouldn't have
been disabled for sparc v9. (Closes: #649841)
Checksums-Sha1:
9af219387ea3084b544d5f08b14bc6a99296da8f 2391 openssl_1.0.1e-2ubuntu1.dsc
3f1b1223c9e8189bfe4e186d86449775bd903460 4459777 openssl_1.0.1e.orig.tar.gz
01419cb057a443065afd53fb9228160800c88f3b 102873 openssl_1.0.1e-2ubuntu1.debian.tar.gz
Checksums-Sha256:
acdb72fc6e6bbc11189158412027748e095e6c0dd8c51db9c65700f68061bd31 2391 openssl_1.0.1e-2ubuntu1.dsc
f74f15e8c8ff11aa3d5bb5f276d202ec18d7246e95f961db76054199c69c1ae3 4459777 openssl_1.0.1e.orig.tar.gz
49e5378fdc8b4395735b09918ac77be76492eb4083de6d6abff108171c0bd8d9 102873 openssl_1.0.1e-2ubuntu1.debian.tar.gz
Files:
5318eba7a56c822ccbdccbda16d28400 2391 utils optional openssl_1.0.1e-2ubuntu1.dsc
66bf6f10f060d561929de96f9dfe5b8c 4459777 utils optional openssl_1.0.1e.orig.tar.gz
8dc50f180a8221b4eb22f21fb5400114 102873 utils optional openssl_1.0.1e-2ubuntu1.debian.tar.gz
Original-Maintainer: Debian OpenSSL Team <pkg-openssl-devel at lists.alioth.debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)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=9wVR
-----END PGP SIGNATURE-----
More information about the Saucy-changes
mailing list