Your message dated Wed, 31 Aug 2022 20:59:17 +0000
with message-id <[email protected]>
and subject line Bug#1010698: fixed in stunnel4 3:5.63-1.1
has caused the Debian Bug report #1010698,
regarding stunnel4: runtime check on openssl too tight?
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1010698: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010698
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: stunnel4
Version: 3:5.63-1
Severity: serious
User: [email protected]
Usertags: flaky
The debci testsuite failed for all architectures after the recent
openssl upload
https://ci.debian.net/data/autopkgtest/testing/amd64/s/stunnel4/21436404/log.gz
Am I right to assume as per
| logs/results.log:DEBUG: 2022-05-07 04:07:41,445: [get_version] Trying to
obtain the version of
/tmp/autopkgtest-lxc.algiqp59/downtmp/build.oOV/src/tests/../src/stunnel
| logs/results.log:DEBUG: 2022-05-07 04:07:41,446: [get_version] Started
`/tmp/autopkgtest-lxc.algiqp59/downtmp/build.oOV/src/tests/../src/stunnel
-version` as process 1544
| logs/results.log:CRITICAL: 2022-05-07 04:07:41,449: [main] Something went
wrong: Stunnel was compiled and run with various OpenSSL versions
…
| autopkgtest [04:07:41]: test upstream: -----------------------]
| upstream FAIL non-zero exit status 1
| autopkgtest [04:07:41]: test upstream: - - - - - - - - - - results - - - - -
- - - - -
| autopkgtest [04:07:41]: @@@@@@@@@@@@@@@@@@@@ summary
| debian-python PASS
| upstream FAIL non-zero exit status 1
that the error is that it was compiled against one version (1.1.1n)
and then tested against another version (1.1.1o)?
stunnel4 -version reports:
| Compiled with OpenSSL 1.1.1n 15 Mar 2022
| Running with OpenSSL 1.1.1o 3 May 2022
and it is fine, the ABI is stable.
Sebastian
--- End Message ---
--- Begin Message ---
Source: stunnel4
Source-Version: 3:5.63-1.1
Done: Paul Gevers <[email protected]>
We believe that the bug you reported is fixed in the latest version of
stunnel4, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Paul Gevers <[email protected]> (supplier of updated stunnel4 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Wed, 31 Aug 2022 21:59:52 +0200
Source: stunnel4
Architecture: source
Version: 3:5.63-1.1
Distribution: unstable
Urgency: medium
Maintainer: Peter Pentchev <[email protected]>
Changed-By: Paul Gevers <[email protected]>
Closes: 1010698
Changes:
stunnel4 (3:5.63-1.1) unstable; urgency=medium
.
* Non-maintainer upload
.
[ Simon Chopin ]
* Fix autopkgtests on new OpenSSL versions (Closes: #1010698)
Checksums-Sha1:
2a3156cc7db1468a04a78d3397257c228580b93a 2181 stunnel4_5.63-1.1.dsc
829385578e6922c5ba93aa8f03316644065ef05b 51340 stunnel4_5.63-1.1.debian.tar.xz
Checksums-Sha256:
c421714c8c8215e9a0a6771dc4c60de3ed30925cf32f57cb8fb63c11f5ee537c 2181
stunnel4_5.63-1.1.dsc
8272a3eb40069dce64dae67d0363518d3df4b85fddd6a48ac29d5111cb55ca21 51340
stunnel4_5.63-1.1.debian.tar.xz
Files:
f56507e27dec4bc24c15ecc0541b5777 2181 net optional stunnel4_5.63-1.1.dsc
086e28a461724cc402913d76a40f19cd 51340 net optional
stunnel4_5.63-1.1.debian.tar.xz
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCAAdFiEEWLZtSHNr6TsFLeZynFyZ6wW9dQoFAmMPvnEACgkQnFyZ6wW9
dQpv2ggAxVQqOd7KCBYer4Nx5PVtTlGiButVa45KnoWVXOSXbguqCvABS2HMliq2
anTa4+1ufLOlQk8aqF1O0Br6+SM8P8CFv4Ab9TZIMkQJG1mzl92I5csMM5XHoUgc
DO0d+9pDV4jEfSfgn/Y87bM7JkpmLRhtPnqHb+kZqNgrlehZeAOOMkC57ylvvKIi
a91AbAXV12fKQh/6IBMSGP4cDpOdwA4Kt+7ZpJGr6idrRJP5M2+NUfCPP5NDJDi9
gt5BZeJYccjwBNmBtnQ68yzP5qkObqHhbPNUIIoIKTJNYosMkZqf1BwM1ScpAOXk
VuvNbNI2ytkQTroa436fWi/GHsE1NQ==
=q2JS
-----END PGP SIGNATURE-----
--- End Message ---