Your message dated Mon, 17 Oct 2005 10:32:07 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#330867: fixed in openssl 0.9.8a-1
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 30 Sep 2005 07:53:05 +0000
>From [EMAIL PROTECTED] Fri Sep 30 00:53:05 2005
Return-path: <[EMAIL PROTECTED]>
Received: from monsta.nomaam.hu [193.202.83.85]
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1ELFhZ-0000O6-00; Fri, 30 Sep 2005 00:53:05 -0700
Received: by monsta.nomaam.hu (Postfix, from userid 1001)
id 9916D865EF3; Fri, 30 Sep 2005 09:52:33 +0200 (CEST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Krisztian PIFKO <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: libssl0.9.7 g series break pam_pgsql
X-Mailer: reportbug 3.17
Date: Fri, 30 Sep 2005 09:52:32 +0200
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level:
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE
autolearn=no version=2.60-bugs.debian.org_2005_01_02
Package: libssl0.9.7
Version: 0.9.7g-2
Severity: grave
Justification: renders package unusable
libpam_pgsql breaks after upgrading to libssl g from libssl e.
the reason (from auth log):
PAM unable to dlopen(/lib/security/pam_pgsql.so)
PAM [dlerror: /usr/lib/i686/cmov/libssl.so.0.9.7: undefined symbol:
HMAC_CTX_set_flags]
PAM adding faulty module: /lib/security/pam_pgsql.so
downgrading to libssl0.9.7_0.9.7e solves the problem.
libpam_pgsql version: 0.5.2-9
-- System Information:
Debian Release: testing/unstable
APT prefers testing
APT policy: (500, 'testing')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.9-ck3-skas3-v8-rc1-bs7-nudi.3
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Versions of packages libssl0.9.7 depends on:
ii debconf [debconf-2.0] 1.4.58 Debian configuration management sy
ii libc6 2.3.5-6 GNU C Library: Shared libraries an
libssl0.9.7 recommends no packages.
-- debconf information excluded
---------------------------------------
Received: (at 330867-close) by bugs.debian.org; 17 Oct 2005 17:38:19 +0000
>From [EMAIL PROTECTED] Mon Oct 17 10:38:19 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
id 1ERYqF-0007h7-00; Mon, 17 Oct 2005 10:32:07 -0700
From: Christoph Martin <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#330867: fixed in openssl 0.9.8a-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Mon, 17 Oct 2005 10:32:07 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level:
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 2
Source: openssl
Source-Version: 0.9.8a-1
We believe that the bug you reported is fixed in the latest version of
openssl, which is due to be installed in the Debian FTP archive:
libcrypto0.9.8-udeb_0.9.8a-1_i386.udeb
to pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8a-1_i386.udeb
libssl-dev_0.9.8a-1_i386.deb
to pool/main/o/openssl/libssl-dev_0.9.8a-1_i386.deb
libssl0.9.8-dbg_0.9.8a-1_i386.deb
to pool/main/o/openssl/libssl0.9.8-dbg_0.9.8a-1_i386.deb
libssl0.9.8_0.9.8a-1_i386.deb
to pool/main/o/openssl/libssl0.9.8_0.9.8a-1_i386.deb
openssl_0.9.8a-1.diff.gz
to pool/main/o/openssl/openssl_0.9.8a-1.diff.gz
openssl_0.9.8a-1.dsc
to pool/main/o/openssl/openssl_0.9.8a-1.dsc
openssl_0.9.8a-1_i386.deb
to pool/main/o/openssl/openssl_0.9.8a-1_i386.deb
openssl_0.9.8a.orig.tar.gz
to pool/main/o/openssl/openssl_0.9.8a.orig.tar.gz
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Christoph Martin <[EMAIL PROTECTED]> (supplier of updated openssl package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Mon, 17 Oct 2005 17:01:06 +0200
Source: openssl
Binary: libssl-dev openssl libssl0.9.8-dbg libcrypto0.9.8-udeb libssl0.9.8
Architecture: source i386
Version: 0.9.8a-1
Distribution: unstable
Urgency: low
Maintainer: Debian OpenSSL Team <[EMAIL PROTECTED]>
Changed-By: Christoph Martin <[EMAIL PROTECTED]>
Description:
libcrypto0.9.8-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl0.9.8 - SSL shared libraries
libssl0.9.8-dbg - Symbol tables for libssl and libcrypt
openssl - Secure Socket Layer (SSL) binary and related cryptographic tools
Closes: 330554 330867 332755 333579
Changes:
openssl (0.9.8a-1) unstable; urgency=low
.
Christoph Martin:
* fix asm entries for some architectures, fixing #332758 properly.
* add noexecstack option to i386 subarch
* include symbol versioning in Configure (closes: #330867)
* include debian-armeb arch (closes: #333579)
* include new upstream patches; includes some minor fixes
* fix dh_shlibdeps line, removing the redundant dependency on
libssl0.9.8 (closes: #332755)
* add swedish debconf template (closes: #330554)
.
Kurt Roeckx:
* Also add noexecstack option for amd64, since it now has an
executable stack with the assembler fixes for amd64.
Files:
d185640b299f65afa64823b59c030004 788 utils optional openssl_0.9.8a-1.dsc
1d16c727c10185e4d694f87f5e424ee1 3271435 utils optional
openssl_0.9.8a.orig.tar.gz
e7f1feab1e60fd3138558b6e6e574ef1 29983 utils optional openssl_0.9.8a-1.diff.gz
9947bc503516ff80d5b04e802e744a8b 982576 utils optional
openssl_0.9.8a-1_i386.deb
008ece8c28da53f49e7d64eca57d1f00 2664634 libs important
libssl0.9.8_0.9.8a-1_i386.deb
bfd324430e404aa7a7bf675df90768be 528764 debian-installer optional
libcrypto0.9.8-udeb_0.9.8a-1_i386.udeb
da860afb4793da0d74b1fd462d27f84c 2935874 libdevel optional
libssl-dev_0.9.8a-1_i386.deb
3239665bf893c91b3e16c9917227fffc 10590314 libdevel extra
libssl0.9.8-dbg_0.9.8a-1_i386.deb
package-type: udeb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
iD8DBQFDU9W8geVih7XOVJcRAtQyAJ9Gh/XqA25SULxTsMHUvo9QO3YarQCgj3pN
bll7+KdfJUpRDWsx62AGKlo=
=uBK0
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]