On Wed, Mar 10, 2010 at 11:30:10AM +0100, Klaus Ethgen wrote:
> Hi,
> 
> Am So den 28. Feb 2010 um 21:24 schrieb Kurt Roeckx:
> > commit 56bf036afe0ab64efdc49daeb3a01466792fa113
> > Author: steve <steve>
> > Date:   Mon Feb 15 19:40:45 2010 +0000
> > 
> >     The "block length" for CFB mode was incorrectly coded as 1 all the 
> > time. It
> >     should be the number of feedback bits expressed in bytes. For CFB1 mode 
> > set
> >     this to 1 by rounding up to the nearest multiple of 8.
> [...]
> > I'm not sure what to do with this, I'll contact upstream about this.
> 
> Any news about that bug?
> 
> There are more and more packages in unstable depending on the broken
> libssl which blocks them from upgrade. I think the problem will get
> worse if it is not fixed recently as the used incompatible CFB will hold
> any upgrade possibility.

I uploaded a 0.9.8m-2 version that fixes it 10 days ago.  It will
probably move to testing tomorrow.

Applications should never be broken.  What could be a problem is
that you encypted something with the 0.9.8m-1 version and can't
decrypt it with any other version.  But that version was never part
of testing.


Kurt




-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to