Your message dated Wed, 06 May 2009 19:32:17 +0000
with message-id <e1m1mqn-0007pz...@ries.debian.org>
and subject line Bug#525042: fixed in openssl-blacklist 0.5-2
has caused the Debian Bug report #525042,
regarding openssl-blacklist: FTBFS: Permission denied on openssl-vulnkey
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
525042: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=525042
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: openssl-blacklist
Version: 0.5-1
Severity: serious

From my pbuilder build log:

...
 debian/rules build
dh_testdir
# Add here commands to configure the package.
touch configure-stamp
dh_testdir
# Add here commands to compile the package.
sh ./test.sh
no args: ./test.sh: line 40: ./openssl-vulnkey: Permission denied
PASS
no modulus: ./test.sh: line 48: ./openssl-vulnkey: Permission denied
PASS
no bits: ./test.sh: line 56: ./openssl-vulnkey: Permission denied
PASS

bad_req.csr: 
./test.sh: line 69: ./openssl-vulnkey: Permission denied
PASS

bad_req.csr (stdin): 
./test.sh: line 78: ./openssl-vulnkey: Permission denied
PASS

bad_x509.pem: 
./test.sh: line 69: ./openssl-vulnkey: Permission denied
PASS

bad_x509.pem (stdin): 
./test.sh: line 78: ./openssl-vulnkey: Permission denied
PASS

bad_rsa.key: 
./test.sh: line 69: ./openssl-vulnkey: Permission denied
PASS

bad_rsa.key (stdin): 
./test.sh: line 78: ./openssl-vulnkey: Permission denied
PASS

bad_rsa_4096.pem: 
./test.sh: line 69: ./openssl-vulnkey: Permission denied
PASS

bad_rsa_4096.pem (stdin): 
./test.sh: line 78: ./openssl-vulnkey: Permission denied
PASS

bad_x509_4096.pem: 
./test.sh: line 69: ./openssl-vulnkey: Permission denied
PASS

bad_x509_4096.pem (stdin): 
./test.sh: line 78: ./openssl-vulnkey: Permission denied
PASS

all bad files (examples/bad_req.csr examples/bad_x509.pem examples/bad_rsa.key 
examples/bad_rsa_4096.pem 
examples/bad_x509_4096.pem): 
./test.sh: line 88: ./openssl-vulnkey: Permission denied
PASS

bad modulus: 
./test.sh: line 97: ./openssl-vulnkey: Permission denied
PASS

good_req.csr: 
./test.sh: line 110: ./openssl-vulnkey: Permission denied
FAIL

good_req.csr (stdin): 
./test.sh: line 119: ./openssl-vulnkey: Permission denied
FAIL

good_x509.pem: 
./test.sh: line 110: ./openssl-vulnkey: Permission denied
FAIL

good_x509.pem (stdin): 
./test.sh: line 119: ./openssl-vulnkey: Permission denied
FAIL

good_rsa.key: 
./test.sh: line 110: ./openssl-vulnkey: Permission denied
FAIL

good_rsa.key (stdin): 
./test.sh: line 119: ./openssl-vulnkey: Permission denied
FAIL

all good files (examples/good_req.csr examples/good_x509.pem 
examples/good_rsa.key): 
./test.sh: line 129: ./openssl-vulnkey: Permission denied
FAIL

some bad files, some good files (examples/bad_req.csr examples/bad_x509.pem 
examples/bad_rsa.key 
examples/bad_rsa_4096.pem examples/bad_x509_4096.pem examples/good_req.csr 
examples/good_x509.pem 
examples/good_rsa.key): 
./test.sh: line 138: ./openssl-vulnkey: Permission denied
PASS

good modulus: 
./test.sh: line 147: ./openssl-vulnkey: Permission denied
FAIL

Non-existent file:
FAIL

Permission denied:
FAIL

----------------------
FAILED
make: *** [build-stamp] Error 1
dpkg-buildpackage: failure: debian/rules build gave error exit status 2




--- End Message ---
--- Begin Message ---
Source: openssl-blacklist
Source-Version: 0.5-2

We believe that the bug you reported is fixed in the latest version of
openssl-blacklist, which is due to be installed in the Debian FTP archive:

openssl-blacklist-extra_0.5-2_all.deb
  to pool/main/o/openssl-blacklist/openssl-blacklist-extra_0.5-2_all.deb
openssl-blacklist_0.5-2.diff.gz
  to pool/main/o/openssl-blacklist/openssl-blacklist_0.5-2.diff.gz
openssl-blacklist_0.5-2.dsc
  to pool/main/o/openssl-blacklist/openssl-blacklist_0.5-2.dsc
openssl-blacklist_0.5-2_all.deb
  to pool/main/o/openssl-blacklist/openssl-blacklist_0.5-2_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 525...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Kees Cook <k...@debian.org> (supplier of updated openssl-blacklist package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Wed, 06 May 2009 12:12:09 -0700
Source: openssl-blacklist
Binary: openssl-blacklist openssl-blacklist-extra
Architecture: source all
Version: 0.5-2
Distribution: unstable
Urgency: low
Maintainer: Kees Cook <k...@debian.org>
Changed-By: Kees Cook <k...@debian.org>
Description: 
 openssl-blacklist - list of blacklisted OpenSSL RSA keys
 openssl-blacklist-extra - list of non-default blacklisted OpenSSL RSA keys
Closes: 525042
Changes: 
 openssl-blacklist (0.5-2) unstable; urgency=low
 .
   * test.sh: fix executable state of openssl-vulnkey (Closes: #525042).
Checksums-Sha1: 
 570c4d8aec972157a3e73f1fd75e3d36b97e2b6c 1378 openssl-blacklist_0.5-2.dsc
 9a27ecc42fde607ff74a1d56e3f2b95a8c3a718d 19447 openssl-blacklist_0.5-2.diff.gz
 f9f2b8cce44cd3fb25c09b10346c4f07c7546a2a 6338582 
openssl-blacklist_0.5-2_all.deb
 4c6020e502fbcefd5efd878e0a6107f19cf0061e 6318228 
openssl-blacklist-extra_0.5-2_all.deb
Checksums-Sha256: 
 ab9a250f35de0e05e4cd1a3e661f6c157f722d314f6153ad6e7e1218c7ee0c49 1378 
openssl-blacklist_0.5-2.dsc
 e655e2c915d1921055cc4b575b740dd36c6975dc542cf2fe8c30bc7c3891b3e5 19447 
openssl-blacklist_0.5-2.diff.gz
 a83eb06095f2a3f8b3230cce1d2374803df45e053841b37c87a63a42f5f2a75b 6338582 
openssl-blacklist_0.5-2_all.deb
 ad4dae4b80b891b731116581ad028f316cd34d19104467bfb2cf15b30c667046 6318228 
openssl-blacklist-extra_0.5-2_all.deb
Files: 
 29b07a120dd94a414c613207ab8dcfab 1378 net optional openssl-blacklist_0.5-2.dsc
 bdab5e399158f2969e37f8cf3fcf4cd1 19447 net optional 
openssl-blacklist_0.5-2.diff.gz
 c633e29fdb1ad514c4d7cced506229b1 6338582 net optional 
openssl-blacklist_0.5-2_all.deb
 1a9af841b74751b8979a3e981548da7a 6318228 net optional 
openssl-blacklist-extra_0.5-2_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Kees Cook <k...@outflux.net>

iEYEARECAAYFAkoB4YEACgkQH/9LqRcGPm3PnQCdGuvZTrHGpMO3MVXzW2raaRAE
UrQAn26wer1Xd75fq5SEokaOPoHFE1l/
=V0FZ
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to