Your message dated Tue, 16 Apr 2019 20:39:11 +0000
with message-id <e1hgurh-000d2v...@fasolo.debian.org>
and subject line Bug#926315: fixed in openssl 1.1.1b-2
has caused the Debian Bug report #926315,
regarding openssl: wget https://google.com fails in d-i
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
926315: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926315
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: openssl
Version: 1.1.1b-1
Severity: important

Dear Maintainer,

$ wget https://google.com

fails in Buster alpha installer, when used from a booted netinst iso
in a tty. It also means that fetch-url fails, and thus one cannot use
https preseeding.

A fix/workaround, is $ touch /usr/lib/ssl/openssl.cnf it appears that
openssl requires for that file to be present, and it cannot be a
dangling symlink. However, in udeb environment such file does not
exists. I guess that maybe libssl1.1-udeb should ship an empty
openssl.cnf there, or ship the regular deb's /etc/ssl/openssl.cnf in
/usr/lib/ssl/openssl.cnf in the udeb.

Regards,

Dimitri.

--- End Message ---
--- Begin Message ---
Source: openssl
Source-Version: 1.1.1b-2

We believe that the bug you reported is fixed in the latest version of
openssl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 926...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Kurt Roeckx <k...@roeckx.be> (supplier of updated openssl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 16 Apr 2019 21:31:11 +0200
Source: openssl
Architecture: source
Version: 1.1.1b-2
Distribution: unstable
Urgency: medium
Maintainer: Debian OpenSSL Team <pkg-openssl-de...@lists.alioth.debian.org>
Changed-By: Kurt Roeckx <k...@roeckx.be>
Closes: 923516 926315
Changes:
 openssl (1.1.1b-2) unstable; urgency=medium
 .
   * Fix BUF_MEM regression (Closes: #923516)
   * Fix error when config can't be opened (Closes: #926315)
   * Ship an openssl.cnf in libssl1.1-udeb.dirs
Checksums-Sha1:
 b188b210cd0138d919ca730ad7cb7dc253f1d436 2614 openssl_1.1.1b-2.dsc
 f74b62e6645be8db6c3f7a9e95a6f904f5be4292 87392 openssl_1.1.1b-2.debian.tar.xz
 d05412d063d01c067414bdf3b8840d1dd992b733 6983 openssl_1.1.1b-2_source.buildinfo
Checksums-Sha256:
 4596cc5147ce07cc9504c2ed65076f1556ced9b31c3d035b049035af0e72f6b4 2614 
openssl_1.1.1b-2.dsc
 2f29be77334f597dd0ffc59be036fe5ae9e01c760b38e1fbe92197eae6d90752 87392 
openssl_1.1.1b-2.debian.tar.xz
 2655e4cf5fa3f072d3c51a14471e531ff19e70cc790797059aca0532a44e07a3 6983 
openssl_1.1.1b-2_source.buildinfo
Files:
 603c59d73fa9eaf266b704b4b2a09e3f 2614 utils optional openssl_1.1.1b-2.dsc
 2ffa90b8210c33157e9e63ca8a3c2dd2 87392 utils optional 
openssl_1.1.1b-2.debian.tar.xz
 47c925025f3c51d635abb5f3516a76b8 6983 utils optional 
openssl_1.1.1b-2_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=lwuV
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to