On 2025-08-08 18:55:22 [+0100], Adam D. Barratt wrote:
> Thanks for the quick response, and for preparing the update.
>
> I released it as SUA 271 earlier today.
Thank you Adam.
> Regards,
>
> Adam
Sebastian
ethod to open the
given URI early")
+- a468bdb02531e ("Add test_verify tests")
+Closes: #1110254
+
+ -- Sebastian Andrzej Siewior Tue, 05 Aug 2025
09:09:41 +0200
+
openssl (3.0.17-1~deb12u1) bookworm; urgency=medium
* Import 3.0.17
diff -Nru openssl-3.0.17/debian/patches/Re
On 2025-08-05 07:51:28 [+0200], To Jonathan Wiltshire wrote:
>
>
> On 3 August 2025 13:06:25 CEST, Jonathan Wiltshire wrote:
> >Hi,
> Hi,
>
> >There are reports of the updated libssl3 causing segfaults in linked
> >applications; please see #1110254.
>
> I prepared a revert of three commits and
On 3 August 2025 13:06:25 CEST, Jonathan Wiltshire wrote:
>Hi,
Hi,
>There are reports of the updated libssl3 causing segfaults in linked
>applications; please see #1110254.
I prepared a revert of three commits and it has been confirmed that it solves
the reported segfaults.
Do you prefer th
On 3 August 2025 13:06:25 CEST, Jonathan Wiltshire wrote:
>Hi,
Hi,
>There are reports of the updated libssl3 causing segfaults in linked
>applications; please see #1110254.
I've seen it. Kurt poked upstream. The referenced bug report mentioned a commit
which has been reverted by the reporter
On 30 July 2025 20:56:40 CEST, Jonathan Wiltshire wrote:
>Hi,
Hi,
>Time is of the essence though. Would you be happy with the following?
>
>| This routine update to OpenSSL fixes a number of miscellaneous minor
>| bugs. An expedited release of this update is necessary to enable updates
>| in
On 2025-07-19 19:14:28 [+0100], Adam D. Barratt wrote:
> On Sun, 2025-06-29 at 23:32 +0200, Sebastian Andrzej Siewior wrote:
> > ClamAV upstream released 1.0.9 which is their LTS version matching
> > the release in Bookworm. It addresses two CVEs:
> >
> > - CVE-2025-201
On 2025-07-13 15:10:50 [+0200], Simon Josefsson wrote:
> Sebastian Andrzej Siewior writes:
>
> > --- openssl-3.0.16/CHANGES.md 2025-02-11 15:47:41.0 +0100
> > +++ openssl-3.0.17/CHANGES.md 2025-07-01 14:11:11.0 +0200
> ...
> > + * SSLv3 is b
Control: tags -1 -moreinfo
On 2025-07-13 11:34:49 [+0200], Paul Gevers wrote:
>
> Hi,
Hi,
> Please go ahead and please removed the moreinfo tag when the package has
> been uploaded.
Uploaded to ssh-upload.
Thank you.
> Paul
>
Sebastian
On 2025-06-22 17:53:05 [+0200], Paul Gevers wrote:
> Please go ahead.
quick question: Is this bug obsolete and can be closed now that this
goes to testing via pu?
> Paul
Sebastian
Lv2 text (thx
+Santiago Vila; closes: #1106311).
+
+ -- Sebastian Andrzej Siewior Sun, 22 Jun 2025 12:23:29 +0200
+
git (1:2.47.2-0.1) unstable; urgency=medium
* Non-maintainer upload.
diff -Nru git-2.47.2/debian/git.links git-2.47.2/debian/git.links
--- git-2.47.2/debian/git.links 2025-01
On 2025-06-22 17:53:05 [+0200], Paul Gevers wrote:
> On 22-06-2025 13:47, Sebastian Andrzej Siewior wrote:
> > > Please find attached the diff addressing just this single bug.
> >
> > again, now with proper suite.
>
>
> Please go ahead.
Thanks, done.
> Paul
Sebastian
.
+ * debian/rules: remove overly strict check for license file
+content matching base-files. This unbreaks the build on
+builders with an updated copy of the GPLv2 text (thx
+Santiago Vila; closes: #1106311).
+
+ -- Sebastian Andrzej Siewior Sun, 22 Jun 2025 13:21:11 +0200
+
git (1:
On 2025-06-19 22:02:00 [+0200], Paul Gevers wrote:
> Control: tags -1 moreinfo
>
> Hi,
Hi,
> On 16-06-2025 00:16, Sebastian Andrzej Siewior wrote:
> > The version in testing is 2.47.2 while unstable had 2.49.0 for a while.
> > This makes diff rather huge (15MiB) therefore
mand line parsing patches for proper handling on big
+endian machines. (Closes: #1106786).
+
+ -- Sebastian Andrzej Siewior Fri, 06 Jun 2025 18:07:16 +0200
+
+git (1:2.49.0-2) unstable; urgency=medium
+
+ * debian/rules: remove overly strict check for license file
+content matching base-fil
Package: release.debian.org
Control: affects -1 + src:git
X-Debbugs-Cc: g...@packages.debian.org
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: jrnie...@gmail.com
Severity: normal
Please unblock package git
This is a preliminary unblock request for the git package.
T
1,3 +1,11 @@
+openssl (3.5.0-2) unstable; urgency=medium
+
+ * Fix P-384 curve on lower-than-P9 PPC64 targets Closes: #1106516).
+ * CVE-2025-4575 ("The x509 application adds trusted use instead of
+rejected use") (Closes: #1106322).
+
+ -- Sebastian Andrzej Siewior Wed, 28 May
Hi,
I intend to upload the 3.5 release for Trixie. Currently I have
3.5-alpha in experimental and it looks good according to debci.
The 3.5 release is LTS and should be supported until April 2030. The
previous LTS release was 3.0.
The release of 3.5.0 is aimed for the 8th April, so I if everything
On 2024-08-24 23:14:46 [+0200], Jérémy Lal wrote:
> Le sam. 24 août 2024 à 13:52, Paul Gevers a écrit :
>
> Indeed, it is harmless.
> Upstream nodejs has fixed this in the 20.x branch by allowing both error
> codes in the failing test.
Is it still the case and if so should I prepare an update or
On 2024-08-21 16:46:29 [+0200], Santiago Vila wrote:
> Hello.
Hi,
> I've just noticed about this new build-essential package.
>
> In sid, coreutils depends on libssl3t64 which in turn depends on
> openssl-provider-legacy.
> Is this really ok and intended?
Yes, it is intended. The package openss
On 2024-08-14 21:05:28 [+0100], Adam D. Barratt wrote:
> Sorry for the delay.
No worries, thank you for handling it.
> I've just flagged the bugfix upload for acceptance into p-u. If you'd
> like to look at 3.0.14 as well, please open a new bug for that. If it
> makes any difference, the window f
On 2024-07-05 23:32:13 [+0200], To sub...@bugs.debian.org wrote:
> In the meantime the patch, that broke it, was reverted and this change
> is part of 3.0.14. I didn't propose 3.0.14 for Bookworm because it was
> close to the point release. (This change is also part of 3.2.2 release
> in unstable.)
ed private "classic"
+keys" (Closes: #1074764).
+
+ -- Sebastian Andrzej Siewior Fri, 05 Jul 2024 23:04:47 +0200
+
openssl (3.0.13-1~deb12u1) bookworm; urgency=medium
* Import 3.0.13
diff -Nru openssl-3.0.13/debian/patches/Revert-Improved-detection-of-engine-provided-private-
On 2024-06-02 13:14:30 [+0200], Sebastian Ramacher wrote:
> Great. Please go ahead.
It built in unstable.
I will upload libclamunrar, it requires a source-full upload.
> Cheers
Sebastian
Control: tags -1 -moreinfo
On 2024-05-15 13:22:13 [+0200], Emilio Pozuelo Monfort wrote:
> Yes, go through experimental if you want to rename it. You'll have to add
> proper conflicts/etc. Let us know once the package is accepted in
> experimental.
The package has been accepted in experimental.
Package: release.debian.org
Control: affects -1 + src:clamav
X-Debbugs-Cc: cla...@packages.debian.org
User: release.debian@packages.debian.org
Usertags: transition
Severity: normal
ClamAV 1.3.x has a new soname. I have the in package in experimental
with libclamav12t64. I would like to go back
On 2024-04-07 23:46:28 [+0200], To Adam D. Barratt wrote:
> On 2024-03-24 20:06:12 [+], Adam D. Barratt wrote:
> >
> > Sorry for not getting to this sooner. Is this still the case?
>
> So. This happened #1068045 (yapet broke with 1.0 format) due to the
> update. On the bright side it has been
On 2024-03-24 20:06:12 [+], Adam D. Barratt wrote:
>
> Sorry for not getting to this sooner. Is this still the case?
So. This happened #1068045 (yapet broke with 1.0 format) due to the
update. On the bright side it has been broken in unstable but unnoticed.
Looking into it but also sleeping (
On 2024-03-24 20:06:12 [+], Adam D. Barratt wrote:
> On Mon, 2024-03-04 at 07:38 +0100, Sebastian Andrzej Siewior wrote:
> > This is an update to the current stable OpenSSL release in the 3.0.x
> > series. It addresses the following CVE reports which were postponed
> >
On 2024-03-08 07:38:10 [+], Adam D. Barratt wrote:
> On Fri, 2024-02-09 at 23:12 +0100, Sebastian Andrzej Siewior wrote:
> > This is an update to the latest clamav release in the 1.0.x series.
>
> One small thing you may want to fix for any follow-up updates:
>
>
On 2024-02-09 23:12:18 [+0100], To sub...@bugs.debian.org wrote:
> Package: release.debian.org
> Control: affects -1 + src:clamav
> X-Debbugs-Cc: cla...@packages.debian.org
> User: release.debian@packages.debian.org
> Usertags: pu
> Tags: bookworm
> Severity: normal
>
> This is an update to th
Package: release.debian.org
Control: affects -1 + src:openssl
X-Debbugs-Cc: open...@packages.debian.org
User: release.debian@packages.debian.org
Usertags: pu
Tags: bookworm
X-Debbugs-Cc: sebast...@breakpoint.cc
Severity: normal
This is an update to the current stable OpenSSL release in the 3.0
strcat(buffer_cmd, filename);
-j += strlen(filename);
+strcat(buffer_cmd, FILENAME_DISABLED_MESSAGE);
+j += strlen(FILENAME_DISABLED_MESSAGE);
i++;
} else {
buffer_cmd[j++] = opt->strarg[i];
diff --git a/common/optp
Package: release.debian.org
Control: affects -1 + src:dar
User: release.debian@packages.debian.org
Usertags: binnmu
Severity: normal
Hi,
if I see this correctly then dar 2.7.13-2 won't migrate to testing
because it was built using openssl 3.0.12-1. This version isn't in
testing and if everyth
On 2023-11-22 22:15:43 [+0100], Jérémy Lal wrote:
> Plase wait a moment before doing more uploads.
> I am gonna deal with it before the end the week. Sorry for that.
Sorry for any trouble I may have caused. I haven't had any response and
I wasn't granted any free rider card so I started backpo
Hi,
OpenSSL didn't migrate to testing for two reasons:
#1 Didn't build on mips64el because slow buildd is slow.
#2 Autopkgtest fails in the latest version due to changes in OpenSSL.
For #1 Kurt increased the priority so it might build eventually.
#2. This is known by nodejs upstream and has b
On 2023-10-02 13:41:17 [+0200], Cyril Brulebois wrote:
> Adam D. Barratt (2023-10-02):
> > Unfortunately, the version format change from -0+deb11uX to -0~deb11uX
> > has broken the installer.
> >
> > The udebs end up with dependencies of the form ">= 1.1.1w", which
> > 1.1.1w-0~deb11u1 doesn't fu
Package: release.debian.org
Control: affects -1 + src:openssl
X-Debbugs-Cc: open...@packages.debian.org
User: release.debian@packages.debian.org
Usertags: pu
Tags: bookworm
X-Debbugs-Cc: sebast...@breakpoint.cc
Severity: normal
This is an update of the openssl package to the 3.0.11 version, a
On 2023-09-23 20:39:32 [+0100], Adam D. Barratt wrote:
> Please go ahead.
Thanks, done.
> Regards,
>
> Adam
Sebastian
Package: release.debian.org
Control: affects -1 + src:mutt
X-Debbugs-Cc: m...@packages.debian.org
User: release.debian@packages.debian.org
Usertags: pu
Tags: bookworm
X-Debbugs-Cc: sebast...@breakpoint.cc
Severity: normal
This is an update mutt package as provided by upstream to version 2.2.12
On 2023-09-14 21:52:25 [+0100], Adam D. Barratt wrote:
>
> That's now out, as SUA-240-1.
Thank you Adam.
> Regards,
>
> Adam
Sebastian
On 2023-09-14 06:31:26 [+0100], Adam D. Barratt wrote:
> On Wed, 2023-09-13 at 22:01 +0200, Sebastian Andrzej Siewior wrote:
> > On 2023-09-13 17:26:46 [+0100], Adam D. Barratt wrote:
> > > How does this sound for an SUA?
> [...]
> > This sounds entirely fine to me. I do
this file except in compliance with the License. You can obtain a copy
@@ -82,13 +82,16 @@
if (!rsa_param_encode(pkey, &str, &strtype))
return 0;
penclen = i2d_RSAPublicKey(pkey->pkey.rsa, &penc);
- if (penclen <= 0)
+if (penclen <= 0) {
+ASN1_STRI
On 2023-09-13 17:26:46 [+0100], Adam D. Barratt wrote:
> How does this sound for an SUA?
>
> ===
> Package : clamav
> Version : 1.0.3+dfsg-1~deb12u1 [bookworm]
>0.103.10+dfsg-0+deb11u1 [bullseye]
> Importance : medium
>
> ClamAV
-1.0.3+dfsg/debian/changelog 2023-09-09 16:36:13.0 +0200
@@ -1,3 +1,10 @@
+clamav (1.0.3+dfsg-1~deb12u1) bookworm; urgency=medium
+
+ * Import 1.0.3
+ * Remove unnecessary warning messages in freshclam during update.
+
+ -- Sebastian Andrzej Siewior Sat, 09 Sep 2023 16:36:13 +0200
T([ClamAV], [0.103.9], [https://github.com/Cisco-Talos/clamav/issues], [clamav], [https://www.clamav.net/])
+AC_INIT([ClamAV], [0.103.10], [https://github.com/Cisco-Talos/clamav/issues], [clamav], [https://www.clamav.net/])
dnl put configure auxiliary into config
AC_CONFIG_AUX_DIR([config])
diff -Nru
On 2023-09-04 21:18:35 [+0200], To Adam D. Barratt wrote:
> > The next point release for both bullseye and bookworm is in a month.
> > Were you looking to have the clamav updates published via -updates
> > before that point?
>
> I almost started preparing 0.103.10 I think it will be easier to go w
On 2023-08-26 14:50:09 [+0200], To sub...@bugs.debian.org wrote:
> This is an update of the openssl package to the 1.1.1v version, a patch
> release
Upstream announced to release 1.1.1w on 11th September. They said it is
a "security-fix" with the highest severity defined as "low". This is
also th
On 2023-09-05 17:36:41 [+0100], Jonathan Wiltshire wrote:
>
> Please go ahead.
Thanks, done.
> Thanks,
Sebastian
On 2023-09-04 19:52:23 [+0100], Adam D. Barratt wrote:
> On Sun, 2023-08-27 at 13:20 +0200, Sebastian Andrzej Siewior wrote:
> > This is a stable update from clamav upstream in the 0.103.x series.
> > It fixes the following CVE
> > - CVE-2023-20197 (Possible DoS in HFS+ file p
date links for version update.
+ * Fix package description. (Closes: #1028585)
+
+ -- Sebastian Andrzej Siewior Sat, 02 Sep 2023 15:29:41 +0200
+
kernelshark (2.2.0-2) unstable; urgency=medium
* Fix symlink names. (Closes: #1035449)
diff -Nru kernelshark-2.2.0/debian/control kernelshark-2.
], [https://github.com/Cisco-Talos/clamav/issues], [clamav], [https://www.clamav.net/])
dnl put configure auxiliary into config
AC_CONFIG_AUX_DIR([config])
diff -Nru clamav-0.103.8+dfsg/debian/changelog clamav-0.103.9+dfsg/debian/changelog
--- clamav-0.103.8+dfsg/debian/changelog 2023-02-17 21:4
On 2023-08-26 14:50:09 [+0200], To sub...@bugs.debian.org wrote:
> Package: release.debian.org
> Control: affects -1 + src:openssl
> User: release.debian@packages.debian.org
> Usertags: pu
> Tags: bullseye
> Severity: normal
>
> This is an update of the openssl package to the 1.1.1v version, a
On 2023-06-26 18:10:57 [+0100], Jonathan Wiltshire wrote:
> Control: tag -1 moreinfo
>
> You're both going to have to help me a) understand what is the user-facing
> problem you're solving which is necessary to fix in stable and b) whether
> you're both agreed on how to fix it.
a) The bpo of manp
control: retitle -1 unblock: openssl/3.0.9-1
On 2023-05-30 22:16:53 [+0200], To sub...@bugs.debian.org wrote:
>
> Please unblock package openssl.
>
> The 3.0.9 release contains security and non-security related fixes for
> the package. There are five new CVEs in total that has been addressed.
>
On 2023-05-28 07:44:13 [+0200], Paul Gevers wrote:
> Hi,
Hi,
> Given the impact of openssl, lets have that exception. Quiet period starts
> on 2023-06-04, we need to ensure it migrated *before* then.
Okay. I'm going to upload to unstable and open an unblock bug. Thank you
for the confirmation.
>
Hi,
there is an upcoming OpenSSL scheduled for next TUE (2023-05-30)
including one security fix of moderate severity [0].
For Bullseye I am going backport ~6 fixes (4 security fixes of minor
severity which were not yet addressed, the upcoming fix and an
alternative fix for CVE-2022-4304).
_Later_
On 2023-04-30 18:43:18 [+0200], Helge Kreutzmann wrote:
> Hello Sebastian,
Hi Helge,
> > - the backport package of manpages-de and manpages-fr provides a
> > man page for xz. These files conflict with the one provided by
> > xz-utils package. The bpo package and xz-utils in Bookworm have prope
V], [0.103.8], [https://github.com/Cisco-Talos/clamav/issues], [clamav], [https://www.clamav.net/])
dnl put configure auxiliary into config
AC_CONFIG_AUX_DIR([config])
diff -Nru clamav-0.103.7+dfsg/debian/changelog clamav-0.103.8+dfsg/debian/changelog
--- clamav-0.103.7+dfsg/debian/changelog
On 2022-09-02 17:02:38 [+0100], Adam D. Barratt wrote:
> Please go ahead, bearing in mind that the window for getting updates
> into 11.5 (and thus bullseye-updates prior to 11.5 being released)
> closes over this weekend.
just uploaded.
> Given that 11.5 is scheduled for a week tomorrow, would y
00d0ac0864e2a506bfc1d977d55d00
-75754d0f4c00d0ac0864e2a506bfc1d977d55d00
-clamav_0.103.6+dfsg.orig.tar.xz
-6212705bf2cb168a55f76ae4cab31fa40909aed8
-7135300
+276875cec2e8a64a834e0c5e9f988aebe0d3ab25
+276875cec2e8a64a834e0c5e9f988aebe0d3ab25
+d1ea680af611ee417616ec3d8615a0e67a495795
+d1ea680af611ee41
5d00
-clamav_0.103.6+dfsg.orig.tar.xz
-6212705bf2cb168a55f76ae4cab31fa40909aed8
-7135300
+f2466c7aaf6e140ea150e0f219c86594f3bc04cb
+f2466c7aaf6e140ea150e0f219c86594f3bc04cb
+d1ea680af611ee417616ec3d8615a0e67a495795
+d1ea680af611ee417616ec3d8615a0e67a495795
+clamav_0.103.7+dfsg.orig.tar.xz
+f0708e3df3a
On 2022-06-08 22:13:09 [+0200], Sebastian Ramacher wrote:
> That would be much appreciated, thanks!
Did so, sorry for the delay. I aimed for Monday but…
> Cheers
Sebastian
On 5 June 2022 19:03:17 UTC, Kurt Roeckx wrote:
>The suggestion was to make an openssl.cnf that's compatible with 1.1.1,
>and so remove or comment out everything related to providers.
>
Ah okay. In that case let me so that tomorrow and close that rc bug with this
change.
>
>Kurt
>
--
Sebasti
On 2022-06-05 19:42:43 [+0200], Sebastian Ramacher wrote:
> Hi Sebastian
Hi Sebastian,
> > Otherwise I'd fear that the only other options are openssl breaking
> > libssl1.1 or renaming /etc/ssl/openssl.cnf to have a version specific
> > name. Given the high number reverse dependencies involved in
On 2022-05-26 18:26:57 [+0200], Sebastian Ramacher wrote:
> Hi Sebastian
Hi,
> We're now at the following blockers for openssl's migration:
…
> Bugs for the autopkgtest regressions have been filed and some are
> already fixed in unstable. So I'll add hints to ignore those
> regressions.
good.
>
change [devel] to the real version [0.xy]
dnl also change VERSION below
-AC_INIT([ClamAV], [0.103.5], [https://github.com/Cisco-Talos/clamav/issues],
[clamav], [https://www.clamav.net/])
+AC_INIT([ClamAV], [0.103.6], [https://github.com/Cisco-Talos/clamav/issues],
[clamav], [https://www.clamav.net/
[devel] to the real version [0.xy]
dnl also change VERSION below
-AC_INIT([ClamAV], [0.103.5], [https://github.com/Cisco-Talos/clamav/issues],
[clamav], [https://www.clamav.net/])
+AC_INIT([ClamAV], [0.103.6], [https://github.com/Cisco-Talos/clamav/issues],
[clamav], [https://www.clamav.ne
On 2022-05-09 00:11:22 [+0200], Sebastian Ramacher wrote:
> Control: tags -1 = confirmed
>
> Please go ahead
Thank you, done.
> Cheers
Sebastian
On 2022-03-24 12:39:55 [+], Adam D. Barratt wrote:
> I've added that text to the announcement for the buster point release.
Thanks.
> If anyone has any changes, please yell ASAP.
The gnutls and perl changes are not yet built. I guess this is intended
;)
> Regards,
>
> Adam
Sebastian
On 2022-03-23 17:40:59 [+], Adam D. Barratt wrote:
> Right, let's have another go at this then:
>
> "
> OpenSSL signature algorithm check tightening
> =
>
> The OpenSSL update provided in this point release includes a
> change to ensure that the req
On 2022-03-22 21:47:52 [+0100], Kurt Roeckx wrote:
> On Tue, Mar 22, 2022 at 08:19:01PM +, Adam D. Barratt wrote:
> > OpenSSL signature algorithm check tightening
> > =
> >
> > The OpenSSL update included in this point release includes a change to
>
On 2022-03-21 22:11:17 [+0100], Julien Cristau wrote:
> Hi,
Hi,
> Specifically, we were hoping to better understand the risk of openssl
> changes breaking existing setups. It's possible the issues with gnutls
> and libnet-ssleay-perl tests were narrowly scoped enough that that risk
> is low, but
On 2022-03-21 22:04:08 [+0100], Salvatore Bonaccorso wrote:
> Hi Sebastian,
Hi Salvatore,
> > +gnutls28 (3.6.7-4+deb10u7.1) buster; urgency=medium
>
> As not yet uploaded, can you change this to 3.6.7-4+deb10u8 instead.
Just did so.
> Regards,
> Salvatore
Sebastian
-improve-testing-against-secured-O.patch to
+pass testsuite with openssl 1.1.1e.
+
+ -- Sebastian Andrzej Siewior Mon, 21 Mar 2022 14:52:01 +0100
+
gnutls28 (3.6.7-4+deb10u7) buster; urgency=medium
* 46_handshake-reject-no_renegotiation-alert-if-handshake.patch pulled from
diff -Nru
On 2022-03-21 17:55:00 [+0200], Adrian Bunk wrote:
> > * Backport upstream fix for test failures with OpenSSL 1.1.1n.
> > (Closes: #1008055)
Thank you Adrian.
Sebastian
SECLEVEL=2 and
+requiring minimum TLSv1.2. However, smaller hashes/keys/versions are
+allowed if one enables SECLEVEL=1. Do so when testing pre v1.2 algos,
+and thus enabling testing more compatability combinations.
+
+Signed-off-by: Dimitri John Ledkov
+Signed-off-by: Sebastian Andrzej Siewior
+
On 2022-03-20 23:15:57 [+0100], Kurt Roeckx wrote:
> > https://ci.debian.net/data/autopkgtest/oldstable/amd64/g/gnutls28/20199677/log.gz
> >
> > Checking TLS 1.0 with ECDHE-ECDSA (SECP384R1)...
> > %COMPAT: Checking TLS 1.0 with ECDHE-ECDSA (SECP384R1)...
> > *** Fatal error: A TLS fatal alert has
On 2022-03-18 14:51:32 [+], Adam D. Barratt wrote:
> Boo. Hope you're doing better.
Thanks, yes.
> > I would also do the upload for Buster, would that work? I remember
> > that
> > the packages, that broken, were already uploaded a few cycles ago.
>
> Also as 1.1.1n?
Yes.
> I assume there
On 2022-03-18 09:21:50 [+], Adam D. Barratt wrote:
> Apologies if the status here got confused - based on the above, I was
> assuming that in the absence of a negative response you would proceed
> with the 1.1.1n-0+deb11u1 plan. For complete clarity, please feel free
> to do so, bearing in mind
On 2022-02-19 17:57:25 [+], Adam D. Barratt wrote:
> Feel free to upload; we'll wait for the d-i ack before accepting the
> package into p-u.
There will be the release of 1.1.1n on Tuesday 15th March 2022 including
a security fix. Therefore I will:
- prepare a security release against 1.1.1k-1
Control: tags -1 - moreinfo
Removing moreinfo tag since I provide more information in my previous
reply.
On 2022-02-28 00:23:22 [+0100], To 995...@bugs.debian.org wrote:
> On 2022-02-14 15:01:34 [+0100], To Sebastian Ramacher wrote:
> > On 2022-02-01 21:11:11 [+0100], Sebastian Ramacher wrote:
>
On 2022-02-14 15:01:34 [+0100], To Sebastian Ramacher wrote:
> On 2022-02-01 21:11:11 [+0100], Sebastian Ramacher wrote:
> > > Could you please update this transition request? It's open for four
> > > months and no visible response.
> >
> > Kurt mention some 100 packages failing to build. I only
On 2022-02-19 17:57:25 [+], Adam D. Barratt wrote:
>
> Feel free to upload; we'll wait for the d-i ack before accepting the
> package into p-u.
Okay. The Bullseye package has been uploaded.
> Regards,
>
> Adam
Sebastian
On 2022-02-19 17:04:16 [+], Adam D. Barratt wrote:
> Control: tags -1 + confirmed d-i
…
> Thanks. Assuming the above is still accurate, then this looks good to
> me.
>
> As the package builds a udeb, it will need a d-i ack; tagging and CCing
> accordingly.
I'm confused. May I upload or do I w
On 2022-02-01 21:11:11 [+0100], Sebastian Ramacher wrote:
> > Could you please update this transition request? It's open for four
> > months and no visible response.
>
> Kurt mention some 100 packages failing to build. I only see a handfull
> of bugs filed. So what's the status on those build fai
On 2022-01-25 18:46:16 [+], Adam D. Barratt wrote:
> For the record, .5 was released via {buster,bullseye}-updates last
> night; see SUA211-1 /
> https://lists.debian.org/debian-stable-announce/2022/01/msg1.html
Thank you.
> Regards,
>
> Adam
Sebastian
g/configure.ac
--- clamav-0.103.4+dfsg/configure.ac 2021-11-13 21:57:13.0 +0100
+++ clamav-0.103.5+dfsg/configure.ac 2022-01-12 20:53:22.0 +0100
@@ -1,4 +1,4 @@
-dnl Copyright (C) 2013-2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
+dnl Copyright (C) 2013-20
On 2022-01-11 21:17:54 [+], Adam D. Barratt wrote:
> Now that the equivalent update made it to stretch, this seems as good a
> time as any - I'm assuming that no major issues have ben reported in
> unstable in the meantime?
correct.
> I wasn't really sure which of the changes made sense to me
On 2021-12-23 15:38:16 [+], Adam D. Barratt wrote:
> Hi,
Hi Adam,
> fwiw, even with the reduced diffs, neither request made it to debian-
> release.
Oh shoot. You're the best Adam. I meant to ping the list in case it
didn't make through but forgot to check…
> Were you anticipating that 0.103
On 2021-10-05 20:03:49 [+0200], Michael Biebl wrote:
> Hi Kurt, hi Luca, hi everyone,
Hi Michael,
> That said, I'm not a lawyer and reading license texts hurts my brain.
> So my goal is is mainly to raise awareness of this issue and seek input from
> the community.
GPL code which linked against O
On 2021-09-10 11:49:39 [+0100], Adam D. Barratt wrote:
> It appears that the bullseye upload is stuck on the upload queue,
> because:
Thank you.
> Regards,
>
> Adam
Sebastian
; >>confdefs.h
-VERSION="0.103.2"
+VERSION="0.103.3"
major=`echo $PACKAGE_VERSION |cut -d. -f1 | sed -e "s/^0-9//g"`
minor=`echo $PACKAGE_VERSION |cut -d. -f2 | sed -e "s/^0-9//g"`
@@ -31896,7 +31896,7 @@
# report actual input values of CONFIG_
ERSION="0.103.3"
major=`echo $PACKAGE_VERSION |cut -d. -f1 | sed -e "s/^0-9//g"`
minor=`echo $PACKAGE_VERSION |cut -d. -f2 | sed -e "s/^0-9//g"`
@@ -31896,7 +31896,7 @@
# report actual input values of CONFIG_FILES etc. instead of their
# values after options hand
On 2021-04-23 08:21:44 [+0100], Adam D. Barratt wrote:
> Ah, apologies for not spotting that from your earlier mail. An updated
> draft:
This is perfect Adam, thank you.
>
> Regards,
>
> Adam
>
Sebastian
On 2021-04-22 16:58:46 [+0100], Adam D. Barratt wrote:
> On Wed, 2021-04-21 at 21:35 +0200, Sebastian Andrzej Siewior wrote:
> > On 2021-04-20 20:52:09 [+0100], Adam D. Barratt wrote:
> > > Please feel free to upload. I assume that, given there are security
> > > fixe
On 2021-04-20 20:52:09 [+0100], Adam D. Barratt wrote:
>
> I'm certainly happy to defer to your judgement here, given our previous
> experience with clamav updates in stable. I was simply trying to
> ascertain the scale of the update involved, but fear I may have just
> confused the discussion; pe
On 2021-04-19 21:15:06 [+0100], Adam D. Barratt wrote:
> > > I guess the diff against the current buster package is quite large
> > > by
> > > this point?
> >
> > What do you mean by this point? We did full clamav uploads in the
> > past.
> > Please excuse if I miss something obvious.
>
> Sorry,
On 2021-04-19 19:41:58 [+0100], Adam D. Barratt wrote:
> On Fri, 2021-04-16 at 09:27 +0200, Sebastian Andrzej Siewior wrote:
> > This is an update from ClamAV from 0.102.4 to 0.103.2. The 103
> > release was in unstable since the beginning. I skipped it for Buster
> > back
Package: release.debian.org
User: release.debian@packages.debian.org
Usertags: pu
Tags: buster
Severity: normal
This is an update from ClamAV from 0.102.4 to 0.103.2. The 103 release
was in unstable since the beginning. I skipped it for Buster back then
because the 102 based release recevied a
1 - 100 of 286 matches
Mail list logo