It looks like the verification-done-bionic tag was added, so I don't
understand this comment.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1832659
Title:
openssl 1.1.1-1ubuntu2.1~18.04.1 contains u
Hi,
The package version 1.1.1-1ubuntu2.1~18.04.3 does fix it for me, thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1832659
Title:
openssl 1.1.1-1ubuntu2.1~18.04.1 contains upstream bug 7350
Here's a reduced reproducer that is python but isn't salt. All it does
is verify the bug in OpenSSL, should return 1 for both calls. I can post
a version in C if that would be helpful. It fails with the current
version in Bionic and succeeds with the bug fixed version.
** Attachment added: "p.py"
Yes, we have to use 2016 salt due to in house modules that need to be
updated. If salt 2016 was updated, we would still have quite a bit of
work to do. The fix in upstream works, in fact just removing
OPENSSL_INIT_NO_LOAD_CONFIG works. But, it also worked before the
openssl update. And I think that
FWIW, here's the code that's being used and the output before the patch
is built and put in place:
https://github.com/saltstack/salt/blob/v2016.11.1/salt/utils/rsax931.py#L36
Traceback (most recent call last):
File "/usr/bin/salt-call", line 11, in
salt_call()
File "/usr/lib/python2.7/di
Public bug reported:
After the update of openssl in bionic, I started having an issue and
after troubleshooting found this issue:
https://github.com/openssl/openssl/issues/7350
Applying the patch linked in that issue and rebuilding the openssl
package avoided the issue.
ProblemType: Bug
DistroR