[ubuntu/saucy-proposed] openssl 1.0.1e-2ubuntu1 (Accepted)

Marc Deslauriers marc.deslauriers at ubuntu.com
Wed May 22 15:15:16 UTC 2013


openssl (1.0.1e-2ubuntu1) saucy; urgency=low

  * Resynchronise with Debian unstable.  Remaining changes:
    - debian/libssl1.0.0.postinst:
      + Display a system restart required notification on libssl1.0.0
        upgrade on servers.
      + Use a different priority for libssl1.0.0/restart-services depending
        on whether a desktop, or server dist-upgrade is being performed.
    - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
      libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
      in Debian).
    - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
      rules}: Move runtime libraries to /lib, for the benefit of
      wpasupplicant.
    - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
      .pc.
    - debian/rules:
      + Don't run 'make test' when cross-building.
      + Use host compiler when cross-building.  Patch from Neil Williams.
      + Don't build for processors no longer supported: i586 (on i386)
      + Fix Makefile to properly clean up libs/ dirs in clean target.
      + Replace duplicate files in the doc directory with symlinks.
    - Unapply patch c_rehash-multi and comment it out in the series as it
      breaks parsing of certificates with CRLF line endings and other cases
      (see Debian #642314 for discussion), it also changes the semantics of
      c_rehash directories by requiring applications to parse hash link
      targets as files containing potentially *multiple* certificates rather
      than exactly one.
    - debian/patches/tls12_workarounds.patch: Workaround large client hello
      issues when TLS 1.1 and lower is in use
    - debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
    - debian/patches/ubuntu_deb676533_arm_asm.patch: Enable arm assembly
      code.
    - debian/patches/arm64-support: Add basic arm64 support (no assembler)
    - debian/rules: Enable optimized 64bit elliptic curve code contributed
      by Google.
  * debian/patches/tls12_workarounds.patch: updated to also disable TLS 1.2
    in test suite since we disable it in the client.
  * Dropped changes:
    - debian/patches/CVE-2013-0169.patch: upstream.
    - debian/patches/fix_key_decoding_deadlock.patch: upstream.
    - debian/patches/CVE-2013-0166.patch: upstream.

openssl (1.0.1e-2) unstable; urgency=high

  * Bump shlibs.  It's needed for the udeb.
  * Make cpuid work on cpu's that don't set ecx (Closes: #699692)
  * Fix problem with AES-NI causing bad record mac (Closes: #701868, #702635, #678353)
  * Fix problem with DTLS version check (Closes: #701826)
  * Fix segfault in SSL_get_certificate (Closes: #703031)

openssl (1.0.1e-1) unstable; urgency=high

  * New upstream version (Closes: #699889)
    - Fixes CVE-2013-0169, CVE-2012-2686, CVE-2013-0166
    - Drop renegiotate_tls.patch, applied upstream
    - Export new CRYPTO_memcmp symbol, update symbol file
  * Add ssltest_no_sslv2.patch so that "make test" works.

openssl (1.0.1c-5) unstable; urgency=low

  * Re-enable assembler versions on sparc.  They shouldn't have
    been disabled for sparc v9.  (Closes: #649841)

Date: Tue, 21 May 2013 16:31:47 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/saucy/+source/openssl/1.0.1e-2ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 21 May 2013 16:31:47 -0400
Source: openssl
Binary: openssl libssl1.0.0 libcrypto1.0.0-udeb libssl1.0.0-udeb libssl-dev libssl-doc libssl1.0.0-dbg
Architecture: source
Version: 1.0.1e-2ubuntu1
Distribution: saucy
Urgency: high
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Description: 
 libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
 libssl-dev - SSL development libraries, header files and documentation
 libssl-doc - SSL development documentation documentation
 libssl1.0.0 - SSL shared libraries
 libssl1.0.0-dbg - Symbol tables for libssl and libcrypto
 libssl1.0.0-udeb - ssl shared library - udeb (udeb)
 openssl    - Secure Socket Layer (SSL) binary and related cryptographic tools
Closes: 649841 678353 699692 699889 701826 701868 702635 703031
Changes: 
 openssl (1.0.1e-2ubuntu1) saucy; urgency=low
 .
   * Resynchronise with Debian unstable.  Remaining changes:
     - debian/libssl1.0.0.postinst:
       + Display a system restart required notification on libssl1.0.0
         upgrade on servers.
       + Use a different priority for libssl1.0.0/restart-services depending
         on whether a desktop, or server dist-upgrade is being performed.
     - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
       libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
       in Debian).
     - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
       rules}: Move runtime libraries to /lib, for the benefit of
       wpasupplicant.
     - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
       .pc.
     - debian/rules:
       + Don't run 'make test' when cross-building.
       + Use host compiler when cross-building.  Patch from Neil Williams.
       + Don't build for processors no longer supported: i586 (on i386)
       + Fix Makefile to properly clean up libs/ dirs in clean target.
       + Replace duplicate files in the doc directory with symlinks.
     - Unapply patch c_rehash-multi and comment it out in the series as it
       breaks parsing of certificates with CRLF line endings and other cases
       (see Debian #642314 for discussion), it also changes the semantics of
       c_rehash directories by requiring applications to parse hash link
       targets as files containing potentially *multiple* certificates rather
       than exactly one.
     - debian/patches/tls12_workarounds.patch: Workaround large client hello
       issues when TLS 1.1 and lower is in use
     - debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
     - debian/patches/ubuntu_deb676533_arm_asm.patch: Enable arm assembly
       code.
     - debian/patches/arm64-support: Add basic arm64 support (no assembler)
     - debian/rules: Enable optimized 64bit elliptic curve code contributed
       by Google.
   * debian/patches/tls12_workarounds.patch: updated to also disable TLS 1.2
     in test suite since we disable it in the client.
   * Dropped changes:
     - debian/patches/CVE-2013-0169.patch: upstream.
     - debian/patches/fix_key_decoding_deadlock.patch: upstream.
     - debian/patches/CVE-2013-0166.patch: upstream.
 .
 openssl (1.0.1e-2) unstable; urgency=high
 .
   * Bump shlibs.  It's needed for the udeb.
   * Make cpuid work on cpu's that don't set ecx (Closes: #699692)
   * Fix problem with AES-NI causing bad record mac (Closes: #701868, #702635, #678353)
   * Fix problem with DTLS version check (Closes: #701826)
   * Fix segfault in SSL_get_certificate (Closes: #703031)
 .
 openssl (1.0.1e-1) unstable; urgency=high
 .
   * New upstream version (Closes: #699889)
     - Fixes CVE-2013-0169, CVE-2012-2686, CVE-2013-0166
     - Drop renegiotate_tls.patch, applied upstream
     - Export new CRYPTO_memcmp symbol, update symbol file
   * Add ssltest_no_sslv2.patch so that "make test" works.
 .
 openssl (1.0.1c-5) unstable; urgency=low
 .
   * Re-enable assembler versions on sparc.  They shouldn't have
     been disabled for sparc v9.  (Closes: #649841)
Checksums-Sha1: 
 9af219387ea3084b544d5f08b14bc6a99296da8f 2391 openssl_1.0.1e-2ubuntu1.dsc
 3f1b1223c9e8189bfe4e186d86449775bd903460 4459777 openssl_1.0.1e.orig.tar.gz
 01419cb057a443065afd53fb9228160800c88f3b 102873 openssl_1.0.1e-2ubuntu1.debian.tar.gz
Checksums-Sha256: 
 acdb72fc6e6bbc11189158412027748e095e6c0dd8c51db9c65700f68061bd31 2391 openssl_1.0.1e-2ubuntu1.dsc
 f74f15e8c8ff11aa3d5bb5f276d202ec18d7246e95f961db76054199c69c1ae3 4459777 openssl_1.0.1e.orig.tar.gz
 49e5378fdc8b4395735b09918ac77be76492eb4083de6d6abff108171c0bd8d9 102873 openssl_1.0.1e-2ubuntu1.debian.tar.gz
Files: 
 5318eba7a56c822ccbdccbda16d28400 2391 utils optional openssl_1.0.1e-2ubuntu1.dsc
 66bf6f10f060d561929de96f9dfe5b8c 4459777 utils optional openssl_1.0.1e.orig.tar.gz
 8dc50f180a8221b4eb22f21fb5400114 102873 utils optional openssl_1.0.1e-2ubuntu1.debian.tar.gz
Original-Maintainer: Debian OpenSSL Team <pkg-openssl-devel at lists.alioth.debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=9wVR
-----END PGP SIGNATURE-----


More information about the Saucy-changes mailing list