Hi Peter,
On Sun, Nov 15, 2015 at 6:00 AM, peter green wrote:
>> socket.o: In function `SSLOpen':
>> /fetchmail-6.3.26/socket.c:917: undefined reference to
>> `SSLv3_client_method'
>> collect2: error: ld returned 1 exit status
>> Makefile:699: recipe for target 'fetchmail' failed
>> make[3]: ***
On Wed, 30 Sep 2015 09:13:36 +0200 Yusuf Iskenderoglu
wrote:
> Package: evolution-ews
> Version: 3.16.3-1
> Severity: grave
> Justification: renders package unusable
>
> Dear Maintainer,
>
> Currently, evolution cannot access EWS anymore and prevents me from using
> company mail.
>
Hi, could y
I think we can make it Debian specific until it gets integrated
upstream.
I took the diff submitted as a pull request upstream, applied it to the
source package from debian (which required some path tweaks and
defuzzing) and uploaded it to raspbian. Debdiff at
http://debdiffs.raspbian.org/
Tags 804603 +patch
thanks
The package fails to build, as openssl have dropped sslv3 support:
./.libs/libcouriertls.a(libcouriertls.o): In function `tls_create':
/courier-0.73.1/libs/tcpd/libcouriertls.c:530: undefined reference to
`SSLv3_method'
collect2: error: ld returned 1 exit status
Makefi
Tags 804604 +patch
thanks
socket.o: In function `SSLOpen':
/fetchmail-6.3.26/socket.c:917: undefined reference to `SSLv3_client_method'
collect2: error: ld returned 1 exit status
Makefile:699: recipe for target 'fetchmail' failed
make[3]: *** [fetchmail] Error 1
I just fixed this in raspbian,
Tags 804605 +patch
thanks
openssl.o: In function `ssl_select_method':
/heirloom-mailx-12.5/openssl.c:220: undefined reference to `SSLv3_client_method'
collect2: error: ld returned 1 exit status
Makefile:92: recipe for target 'mailx' faile
I just fixed this in raspbian, debdiff at
http://debd
Processing control commands:
> found -1 0.8-3
Bug #799880 {Done: Felipe Sateler } [src:patchelf]
patchelf: ftbfs on ppc64el - pageSize problems
Marked as found in versions patchelf/0.8-3; no longer marked as fixed in
versions patchelf/0.8-3 and reopened.
> clone -1 -2
Bug #799880 [src:patchelf]
Your message dated Sat, 14 Nov 2015 23:34:03 +
with message-id
and subject line Bug#805103: fixed in libmessage-passing-filter-regexp-perl
0.05-2
has caused the Debian Bug report #805103,
regarding libmessage-passing-filter-regexp-perl: FTBFS: missing
build-dependency on libjson-perl
to be m
Your message dated Sat, 14 Nov 2015 23:33:59 +
with message-id
and subject line Bug#804693: fixed in engine-pkcs11 0.2.0-2
has caused the Debian Bug report #804693,
regarding Broken symlink: engine_pkcs11.so -> ../ssl/engines/engine_pkcs11.so
to be marked as done.
This means that you claim th
Your message dated Sat, 14 Nov 2015 23:34:08 +
with message-id
and subject line Bug#805102: fixed in libmessage-passing-perl 0.116-2
has caused the Debian Bug report #805102,
regarding libmessage-passing-perl: missing runtime and build dependencies on
libjson-perl
to be marked as done.
This
Processing commands for cont...@bugs.debian.org:
> severity 802118 important
Bug #802118 [libengine-pkcs11-openssl] libengine-pkcs11-openssl: Functions to
set static global data may cause memory leak.
Severity set to 'important' from 'grave'
> thanks
Stopping processing here.
Please contact me i
Source: transgui
Version: 5.0.1-2
Severity: serious
Control: block 797926 by -1
Hi,
Your package seems to have a dependency on libssl1.0.0. It has
just been renamed to libssl1.0.2. After a rebuild you still
depend on libss1.0.0.
It seems the library is loaded using:
LoadLibrary(PChar('libssl.
Processing commands for cont...@bugs.debian.org:
> tags 804454 + upstream
Bug #804454 [soundconverter] [soundconverter] Does not write any output files.
Added tag(s) upstream.
> forwarded 804454
> https://bugs.launchpad.net/ubuntu/+source/soundconverter/+bug/1516319
Bug #804454 [soundconverter] [
Processing control commands:
> block 797926 by -1
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 804603 803972 804138 804619 804326 804452 804455 804324
804615 803974 804623 805124 804334 804089 804440 804611 804327 803889 804463
805114 804616 8
Processing control commands:
> block 797926 by -1
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 805121 804605 804324 804334 804615 804606 804604 805117
803975 804467 805097 804607 804138 804431 804611 805083 803753 804603 803889
804623 804326 8
Source: trafficserver
Version: 6.0.0-2
Severity: serious
Control: block 797926 by -1
Hi,
Your package is failing to build on ppc64el. It looks like this
is the error:
configure:25484: cc -c -g -O2 -fPIE -fstack-protector-strong -Wformat
-Werror=format-security -O3 -std=gnu99 -pipe -Wall
-felim
Processing control commands:
> block 797926 by -1
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 804603 804327 803972 804615 804604 804606 804324 803881
804440 804467 805083 804334 805117 804326 805084 803886 804611 804463 803975
803974 804457 8
Your message dated Sat, 14 Nov 2015 22:35:25 +
with message-id
and subject line Bug#804666: fixed in simutrans 120.1.1+repack-1
has caused the Debian Bug report #804666,
regarding simutrans: FTBFS: convert convert: Unrecognized option (-alpha).
to be marked as done.
This means that you claim
Source: swi-prolog
Version: 7.2.0-2
Severity: serious
Control: block 797926 by -1
Hi,
Your package is failing to build with the following error on
ppc64el:
JUNIT=/usr/share/java/junit.jar JAVA=java JAVA_PRELOAD= ./test-java.sh
Welcome to SWI-Prolog (Multi-threaded, 64 bits, Version 7.2.0)
Copyrig
On Wed, May 20, 2015 at 04:03:06PM +0300, sl...@debian.org wrote:
> Source: morituri
> Severity: important
> User: sl...@debian.org
> Usertags: gstreamer0.10-removal
>
> Hi maintainer,
>
> your package morituri currently still depends on GStreamer 0.10.
>
> GStreamer 0.10 is no longer maintained
Processing control commands:
> block 797926 by -1
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 804463 803886 804138 804455 804431 804603 804452 804326
804089 804324 804604 804611 804623 804620 804616 803972 804615 805097 803975
803974 804619 8
Source: kumofs
Version: 0.4.13-6.1
Severity: serious
Control: block 797926 by -1
Hi,
Your package is failing to build on ppc64el with the following
error:
cluster.cc: In member function 'void
rpc::cluster_transport::init_message(rpc::msgobj, rpc::auto_zone)':
cluster.cc:134:1: error: unrecogniza
Your message dated Sat, 14 Nov 2015 22:22:40 +
with message-id
and subject line Bug#799840: fixed in samba 2:4.3.1+dfsg-1
has caused the Debian Bug report #799840,
regarding libpam-smbpass: installed libpam-smbpass break all local login
to be marked as done.
This means that you claim that the
Processing commands for cont...@bugs.debian.org:
> unblock 797926 with 804336
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 804324 803974 804386 804603 804463 803753 804611 804619
803972 804440 805118 804089 804623 804604 805084 803889 804336 80
Source: galera-3
Version: 25.3.12-3
Severity: serious
Control: block 797926 by -1
Hi,
Your package FTBFS on s390x. It's unclear to me what the error
is. For a full log see:
https://buildd.debian.org/status/fetch.php?pkg=galera-3&arch=s390x&ver=25.3.12-3&stamp=1447450818
Kurt
Processing control commands:
> block 797926 by -1
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 805112 804336 805114 803889 804467 803972 804623 804807
804606 804463 804334 804604 804611 804457 804440 805084 804431 804452 804616
803753 803886 8
Source: kannel-sqlbox
Version: 0.7.2-3
Severity: serious
Control: block 797926 by -1
Hi,
You have a build-depedency on kannel-dev (<< 1.4.4), but the
current version in unstable is 1.4.4-1+b1.
Kurt
Processing commands for cont...@bugs.debian.org:
> block 797926 with 804386
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 804334 804603 804623 804611 803886 803753 803972 804431
804463 804440 804607 804452 805114 803881 804467 804616 805083 8044
Processing commands for cont...@bugs.debian.org:
> block 797926 with 804467
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 804605 804463 805084 804440 804620 804611 804336 804089
804603 803972 805112 803881 804606 803974 803975 804623 805117 8046
Processing control commands:
> block 797926 by -1
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 804605 803975 804620 804615 804440 804606 803881 804326
804607 803974 804603 804619 804334 805112 803886 804611 804327 804324 804336
804604 804431 8
Hi,
So you have code like this for both client and server:
static int worker_set_client_method(worker_t * worker, const char
*sslstr) {
int is_ssl = 0;
ssl_wconf_t *config = ssl_get_worker_config(worker);
if (strcasecmp(sslstr, "SSL") == 0) {
is_ssl = 1;
config->meth = SSLv23_client
Processing commands for cont...@bugs.debian.org:
> block 797926 with 804606
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 805112 804463 804615 804431 803975 803886 804327 805097
803881 804605 804440 804452 803753 804619 804334 804089 804138 8050
Hi,
So looking at the code your currently have:
method=((!protocol || !*protocol)
? NULL:
strcmp(protocol, "SSL3") == 0
? SSLv3_method():
strcmp(protocol, "SSL23") == 0
? SSLv23_method():
Processing commands for cont...@bugs.debian.org:
> block 797926 with 804603
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 804138 804616 804336 804334 803753 804607 805097 804619
805114 804324 804327 804326 804463 803975 803886 805112 804615 8044
Your message dated Sat, 14 Nov 2015 21:38:57 +
with message-id
and subject line Bug#804708: fixed in wpa 2.3-2.3
has caused the Debian Bug report #804708,
regarding wpa: CVE-2015-5314 CVE-2015-5315: EAP-pwd missing last fragment
length validation
to be marked as done.
This means that you cla
Your message dated Sat, 14 Nov 2015 21:38:57 +
with message-id
and subject line Bug#804707: fixed in wpa 2.3-2.3
has caused the Debian Bug report #804707,
regarding wpa: CVE-2015-5310: wpa_supplicant unauthorized WNM Sleep Mode GTK
control
to be marked as done.
This means that you claim that
Your message dated Sat, 14 Nov 2015 21:38:57 +
with message-id
and subject line Bug#804710: fixed in wpa 2.3-2.3
has caused the Debian Bug report #804710,
regarding wpa: CVE-2015-5316: EAP-pwd peer error path failure on unexpected
Confirm message
to be marked as done.
This means that you cla
Your message dated Sat, 14 Nov 2015 21:39:10 +
with message-id
and subject line Bug#804431: fixed in zeroinstall-injector 2.10-1
has caused the Debian Bug report #804431,
regarding zeroinstall-injector: FTBFS: error: The implementation
support/hash.ml does not match the interface support/hash
Processing control commands:
> block 797926 by -1
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 804615 804326 804457 804431 804327 804336 804623 804463
804089 804452 805112 803886 804607 805084 804807 804620 803753 803881 805097
804440 805083 8
Source: medusa
Version: 2.1.1-1
Severity: serious
Control: block 797926 by -1
Hi,
SSLv3 support has been removed in Debian and as a result your
package now fails to build. The code looks like this:
/* The SSL context can support SSLv2, SSLv3, or both. The default is to use
whatever
the s
Processing commands for cont...@bugs.debian.org:
> tags 805113 + fixed-upstream
Bug #805113 [libpng12-0] CVE-2015-8126: buffer overflow
Added tag(s) fixed-upstream.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
805113: http://bugs.debian.org/cgi-bin/bugreport.cg
Package: libpng12-0
Version: 1.2.50-2+b2
Severity: critical
Tags: security upstream
Quoting https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8126
> Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE
> functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.
Processing commands for cont...@bugs.debian.org:
> block 797926 with 804440
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 804455 803974 804605 805097 804604 804616 804807 805084
804620 804457 804611 804452 804431 805112 804463 805083 803975 8039
Processing control commands:
> block 797926 by -1
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 804457 805084 804431 804455 803753 804334 805083 804604
804607 804619 803881 804605 804324 803975 804138 804615 803974 804611 804327
803889 804807 8
Source: zorp
Version: 3.9.5-7
Severity: serious
Control: block 797926 by -1
Hi,
The SSLv3 methods in the openssl package have been removed and as
a result your package can't be build anymore.
The code looks like:
if (strcmp(self->ssl_opts.ssl_method[side]->str, "SSLv23") == 0)
{
if (
Processing control commands:
> severity -1 serious
Bug #613674 [xutils-dev] Subject: xutils-dev: Can't get have_xmlto_text unless
I add some content to the conftest.xml
Severity set to 'serious' from 'normal'
> affects -1 src:libxdmcp
Bug #613674 [xutils-dev] Subject: xutils-dev: Can't get have_x
Control: reassign -1 libatompub-perl 0.3.7-2
Control: retitle -1 libatompub-perl: doesn't work with
Perl6::Export::Attrs-0.0.4
Control: affects -1 libatombus-perl
On Sat, Nov 14, 2015 at 09:19:14PM +0200, Niko Tyni wrote:
> Package: libatombus-perl
> Version: 1.0405-2
> Severity: serious
>
> Th
Processing control commands:
> reassign -1 libatompub-perl 0.3.7-2
Bug #805105 [libatombus-perl] libatombus-perl: FTBFS: Atompub::DateTime does
not export: datetime
Bug reassigned from package 'libatombus-perl' to 'libatompub-perl'.
No longer marked as found in versions libatombus-perl/1.0405-2.
Package: libatombus-perl
Version: 1.0405-2
Severity: serious
This package fails to build on current sid:
Atompub::DateTime does not export: datetime
use Atompub::DateTime failed at /<>/lib/AtomBus.pm line 5.
BEGIN failed--compilation aborted at /<>/lib/AtomBus.pm line 5.
Compilation faile
Processing commands for cont...@bugs.debian.org:
> retitle 805102 libmessage-passing-perl: missing runtime and build
> dependencies on libjson-perl
Bug #805102 [liblog-dispatch-message-passing-perl]
liblog-dispatch-message-passing-perl: FTBFS: t/basic.t failure
Changed Bug title to 'libmessage-p
retitle 805102 libmessage-passing-perl: missing runtime and build dependencies
on libjson-perl
reassign 805102 libmessage-passing-perl 0.116-1
affects 805102 liblog-dispatch-message-passing-perl
thanks
On Sat, Nov 14, 2015 at 08:55:33PM +0200, Niko Tyni wrote:
> Package: liblog-dispatch-message-
Package: libmessage-passing-filter-regexp-perl
Version: 0.05-1
Severity: serious
Tags: sid
This package fails to build on current sid:
Can't locate JSON.pm in @INC (you may need to install the JSON module) (@INC
contains: lib /<>/blib/lib /<>/blib/arch /etc/perl
/usr/local/lib/x86_64-linux-gn
Package: liblog-dispatch-message-passing-perl
Version: 0.009-2
Severity: serious
Tags: sid
This package fails to build on current sid:
Can't locate JSON.pm in @INC (you may need to install the JSON module) (@INC
contains: /<>/inc /<>/blib/lib
/<>/blib/arch /etc/perl
/usr/local/lib/x86_64-li
> That would be very useful. I've uploaded the new package here:
>
> https://mentors.debian.net/package/zeroinstall-injector
"Successfully uploaded zeroinstall-injector_2.10-1_amd64.changes to
ftp.upload.debian.org for ftp-master."
:)
Regards,
--
,''`.
: :' : Chris Lamb
Hi,
So the code looks like:
if (0 == strcmp("sslv23", protocol))
{
verb ("V: using SSLv23_client_method()");
ctx = SSL_CTX_new(SSLv23_client_method());
} else if (0 == strcmp("sslv3", protocol))
{
verb ("V: using SSLv3_client_method()");
ctx = SSL_CTX_new(SSLv3_client_metho
Processing commands for cont...@bugs.debian.org:
> block 797926 with 804431
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 804457 804463 803974 804324 803972 805084 804620 804327
804607 804089 804611 804452 803886 805097 804138 804615 804605 8046
Your message dated Sat, 14 Nov 2015 18:06:37 +
with message-id
and subject line Bug#803778: fixed in wine-development 1.7.54-2
has caused the Debian Bug report #803778,
regarding wine-development: arch all FTBFS on 64-bit architectures
to be marked as done.
This means that you claim that the
Your message dated Sat, 14 Nov 2015 18:06:37 +
with message-id
and subject line Bug#803778: fixed in wine-development 1.7.54-2
has caused the Debian Bug report #803778,
regarding No wine-development package and so not binary available anymore
to be marked as done.
This means that you claim th
Processing commands for cont...@bugs.debian.org:
> block 797926 with 804619
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 803886 804607 803881 804615 804455 804138 804807 804324
805097 804623 804463 804611 804605 803889 803974 803975 804616 8037
Source: sslsplit
Version: 0.4.11+dfsg-1
Severity: serious
Control: block 797926 by -1
Hi,
The SSLv3 method has been disabled in Debian so your package now
fails to build. You have this code:
#ifdef SSL_OP_NO_SSLv3
if (!strcmp(optarg, "ssl3")) {
opts->sslmethod = SSLv3_met
Processing control commands:
> block 797926 by -1
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 803974 805083 804604 803889 803881 803753 804605 803975
803886 804336 804452 803972 804457 804623 804455 805084 804611 804620 804324
804089 804616 8
Hi,
I see various things like:
typedef enum pj_ssl_sock_proto
{
PJ_SSL_SOCK_PROTO_DEFAULT, /**< Default protocol of backend. */
PJ_SSL_SOCK_PROTO_TLS1, /**< TLSv1.0 protocol. */
PJ_SSL_SOCK_PROTO_SSL3, /**< SSLv3.0 protocol. */
PJ_SS
Source: sflphone
Severity: grave
Tags: security
I just saw this in the code:
SSL_CTX_set_cipher_list(ctx, "ALL");
This enables ciphers you don't want, it might include those that
don't provide authentication or encryption.
Kurt
Processing commands for cont...@bugs.debian.org:
> block 797926 with 804615
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 804336 804604 804327 804611 805083 803972 804607 803975
803889 804457 804463 804334 803881 804807 804326 804605 804455 8046
Processing commands for cont...@bugs.debian.org:
> # Was issue in boost that's already fixed
> close 803753
Bug #803753 [src:reconserver] reconserver: FTBFS: context.ipp:92:29: error:
'::SSLv3_method' has not been declared
Marked Bug as done
> thanks
Stopping processing here.
Please contact me i
Hi,
So you currently have:
static const SSL_METHOD *
ssl_select_method(const char *uhp)
{
const SSL_METHOD *method;
char*cp;
cp = ssl_method_string(uhp);
if (cp != NULL) {
if (equal(cp, "ssl3"))
method = SSLv3_client_meth
Processing commands for cont...@bugs.debian.org:
> block 797926 with 803753
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 804336 803886 804623 804807 804607 804334 805084 804457
804452 803889 803881 804604 804611 804324 804620 803975 805083 8039
Processing commands for cont...@bugs.debian.org:
> block 797926 with 804605
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 804623 804611 805084 804138 804457 804616 803886 803975
804326 803881 804455 805083 804604 803889 804089 804607 804463 8043
Processing commands for cont...@bugs.debian.org:
> block 797926 with 804604
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 804089 803881 805084 804452 804327 804457 804455 804336
804326 803886 803889 804623 804138 804334 803974 803972 804616 8048
Processing commands for cont...@bugs.debian.org:
> block 797926 with 804807
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 804089 804455 805084 804138 804616 803889 804452 804620
803886 804334 803975 805083 804623 803881 804336 804611 803972 8046
Processing commands for cont...@bugs.debian.org:
> block 797926 with 804463
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 804455 804616 804807 804457 804334 803974 804623 804324
803975 804611 804452 804326 804327 803972 805084 804607 803889 8040
Your message dated Sat, 14 Nov 2015 16:20:52 +
with message-id
and subject line Bug#803248: fixed in openscad 2015.03-1+dfsg-3
has caused the Debian Bug report #803248,
regarding openscad: B-D on obsolete *-swx11 packages
to be marked as done.
This means that you claim that the problem has be
On 11/14/2015 08:47 AM, Kurt Roeckx wrote:
> On Sat, Nov 14, 2015 at 08:34:47AM -0700, Alex Rousskov wrote:
>> On 11/14/2015 06:39 AM, Kurt Roeckx wrote:
>>> Source: polygraph
>>> Version: 4.3.2-1.2
>>> Severity: serious
>>> Control: block 797926 by -1
>>
>>> I suggest you remove all of that and on
On Sat, Nov 14, 2015 at 08:34:47AM -0700, Alex Rousskov wrote:
> On 11/14/2015 06:39 AM, Kurt Roeckx wrote:
> > Source: polygraph
> > Version: 4.3.2-1.2
> > Severity: serious
> > Control: block 797926 by -1
>
> > I suggest you remove all of that and only use SSLv23_method().
> > All the other are
Your message dated Sat, 14 Nov 2015 16:27:38 +0100
with message-id <564752ea.4080...@tiscali.it>
and subject line Closing bug 799186, solved
has caused the Debian Bug report #799186,
regarding kdelibs/ktextedit: keypresses are logged
to be marked as done.
This means that you claim that the problem
On 11/14/2015 06:39 AM, Kurt Roeckx wrote:
> Source: polygraph
> Version: 4.3.2-1.2
> Severity: serious
> Control: block 797926 by -1
> I suggest you remove all of that and only use SSLv23_method().
> All the other are version specific methods, only SSLv23_* speaks
> multiple versions.
Removal of
Processing commands for cont...@bugs.debian.org:
> retitle 799186 kdelibs/ktextedit: keypresses are logged
Bug #799186 [konqueror] konqueror: now comes with built-in keylogger
Changed Bug title to 'kdelibs/ktextedit: keypresses are logged' from
'konqueror: now comes with built-in keylogger'
> rea
retitle 799186 kdelibs/ktextedit: keypresses are logged
reassign 799186 libkdeui5 kde4libs/4:4.14.10-3
thanks
On Wed, 16 Sep 2015 23:04:24 +0200 M4:4.14.13-1artin Steigerwald
wrote:
> Am Mittwoch, 16. September 2015, 22:55:23 CEST schrieb Dominik George:
> > > I think this is an upstream bug â
I am not sure about those SIGPIPEs. They occured to me, too, but I
could just press 'c' in gdb and continue using iceweasel until the
SIGSEGV. On the other hand, they are apparently gone now in stretch.
Could you press 'c' next time it happens, and wait for a SIGSEGV to occur?
Processing commands for cont...@bugs.debian.org:
> block 797926 with 804616
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 804607 805084 803889 804138 803974 803975 804324 803886
803881 804623 804334 804089 804455 804611 804452 804327 805083 8046
Hi,
You already had to apply a patch like that for SSLv2. You could
just do the same for SSLv3.
But I recommend you get rid of all the methods other than
SSLv23_*. Only the SSLv23_* methods support multiple versions.
If you want to limit the support of supported protocols I suggest
you use SSL
Processing commands for cont...@bugs.debian.org:
> block 797926 with 804611
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 803889 804138 804326 804455 803886 803881 805083 804089
804620 803974 804607 804452 804336 804457 804334 803975 804324 8039
Package: flashplugin-nonfree
Version: 1:3.6.1
Followup-For: Bug #801866
Same problem is also now:
installed version = 11.2.202.540
upstream version = 11.2.202.548
downloading
http://people.debian.org/~bartm/flashplugin-nonfree/D5C0FC14/fp.11.2.202.548.sha512.i386.pgp.asc
...
--2015-11-14 15:44
Processing control commands:
> block 797926 by -1
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 804327 804607 803881 804334 803975 805083 804324 804336
804452 804620 803974 804138 803972 804623 804089 804455 804326 803889 804457
803886
797926 w
Source: python-srp
Version: 1.0.4-1
Severity: serious
Control: block 797926 by -1
Hi,
It seems you have a hardcoded dependency on libssl1.0.0. The
package has been renamed to libssl1.0.2 and you now depend on both
of them. Please remove the hardcoded dependency.
Kurt
Processing control commands:
> block 797926 by -1
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 803889 804138 803886 804620 804324 803972 804455 803975
804336 804089 804327 804457 803974 803881 804623 804607 804334 804452 804326
797926 was not b
Processing commands for cont...@bugs.debian.org:
> reassign 802995 ftp.debian.org
Bug #802995 [alarm-clock] Should this package be removed?
Bug reassigned from package 'alarm-clock' to 'ftp.debian.org'.
Ignoring request to alter found versions of bug #802995 to the same values
previously set
Igno
Source: polygraph
Version: 4.3.2-1.2
Severity: serious
Control: block 797926 by -1
Hi,
The SSLv3 method has been disabled in openssl and as a result your
package no longer build.
The code looks like this:
switch(protocol) {
case SSLv2:
#ifndef OPENSSL_NO_SSL2
reassign 802995 ftp.debian.org
retitle 802995: RM: alarm-clock - unmaintained, dead upstream, depends on
gstreamer 0.10
thanks
On Sun, Oct 25, 2015 at 09:37:55PM +0100, Moritz Muehlenhoff wrote:
> Package: alarm-clock
> Severity: serious
>
> alarm-clock hasn't seen a maintainer upload since 2009
Processing commands for cont...@bugs.debian.org:
> reassign 802993 ftp.debian.org
Bug #802993 [g2ipmsg] Should this package be removed?
Bug reassigned from package 'g2ipmsg' to 'ftp.debian.org'.
Ignoring request to alter found versions of bug #802993 to the same values
previously set
Ignoring req
reassign 802993 ftp.debian.org
retitle 802993 RM: g2ipmsg - dead upstream, unmaintained, unused, depends on
gstreamer 0.10
thanks
On Sun, Oct 25, 2015 at 09:33:53PM +0100, Moritz Muehlenhoff wrote:
> Package: g2ipmsg
> Severity: serious
>
> - Dead upstream (last release from 2008)
> - Unmaintain
Package: pjproject
Version:**2.4~dfsg-1
Severity: serious
Openssl in stretch/sid has dropped the SSLv3 functions. This makes your package
fail to build (at an earlier point in the build than previously reported build
failures
gcc -o ../bin/pjlib-test-x86_64-pc-linux-gnu \
output/pjlib-t
On 12 November 2015 at 11:28, Chris Lamb wrote:
> Hi Thomas,
>
>> I think this was fixed in 2.9:
>
> Great stuff.
>
>> [ I'm still working on getting my GPG key upgraded, so can't upload
>> new packages to Debian at the moment. ]
>
> No problem. Let me know if you need sponsorship in the meantime,
Processing commands for cont...@bugs.debian.org:
> # This was a bug in boost, fixed in boost
> close 803756
Bug #803756 [src:pion] pion: FTBFS: error: '::SSLv3_method' has not been
declared
Marked Bug as done
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
803756
Looking at the code it has:
static LSEC_SSL_METHOD* str2method(const char *method)
{
if (!strcmp(method, "sslv23")) return SSLv23_method();
if (!strcmp(method, "sslv3")) return SSLv3_method();
if (!strcmp(method, "tlsv1")) return TLSv1_method();
#if (OPENSSL_VERSION_NUMBER >= 0x1000100fL
Processing commands for cont...@bugs.debian.org:
> block 797926 with 804138
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 804457 804623 804620 803972 804326 803886 804089 803974
804336 804455 803975 804452 803889 804327 804324 804334 804607 8038
Hi,
The code looks like this:
#ifndef OPENSSL_NO_SSL2
case 2:
method = SSLv2_client_method();
break;
#endif
case 3:
method = SSLv3_client_method();
break;
#ifdef WITH_SSL_TLS1
case 4:
method = TLSv1_client_method();
break;
#endif
default:
method = SSLv23_client_
Hi,
You should change the call from SSLv3_client_method() to
SSLv23_client_method().
The SSLv3_* call only talks SSLv3 while the SSLv23_* call is the
only one supporting multiple protocol version.
I suggest you also get that fixed in the stable branches.
Kurt
Processing commands for cont...@bugs.debian.org:
> block 797926 with 804620
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
797926 was blocked by: 803881 804334 804623 804457 804336 804455 804452 804327
804607 804324 804326 803975 803972 803974 804089 803886 803889
7979
Severity 754681 important
Thanks
kfreebsd is no longer a release architecture.
1 - 100 of 109 matches
Mail list logo