On 01/02/16 18:14, Mattia Rizzolo wrote:
> If I'm looking right at this transition the only remaining package is
> pbbam, where the maintainer-built binary was built against the old
> libssl.
>
> Please binNMU it.
>
> Does it being ma:same implies you should binNMU all archs to preserve
> coinsta
If I'm looking right at this transition the only remaining package is
pbbam, where the maintainer-built binary was built against the old
libssl.
Please binNMU it.
Does it being ma:same implies you should binNMU all archs to preserve
coinstallability?
--
regards,
Mattia R
On 2015-11-09 18:04, Emilio Pozuelo Monfort wrote:
> On 09/11/15 11:30, Andreas Beckmann wrote:
>> What about experimental?
> Thanks, scheduling those.
Thanks. Just checked the packages still appearing in the list and filed
two unrelated FTBFS bugs and one SSLv3 bug (thrift).
Andreas
On 09/11/15 11:30, Andreas Beckmann wrote:
> On Sat, 7 Nov 2015 12:30:11 +0100 Emilio Pozuelo Monfort
> wrote:
>> All the rdeps have been binNMUed at this stage.
>
> What about experimental? Is there a "apt-cache rdepends libssl1.0.0"
> equivalent command that only reports packages from experim
On Sat, 7 Nov 2015 12:30:11 +0100 Emilio Pozuelo Monfort
wrote:
> All the rdeps have been binNMUed at this stage.
What about experimental? Is there a "apt-cache rdepends libssl1.0.0"
equivalent command that only reports packages from experimental?
Anyway, here we have a list:
atheme-services
On Sat, Nov 07, 2015 at 12:30:11PM +0100, Emilio Pozuelo Monfort wrote:
> All the rdeps have been binNMUed at this stage. Now bugs need to be reported
> so
> the buggy packages are either fixed or leave testing.
I'll work on it when I have time.
Kurt
All the rdeps have been binNMUed at this stage. Now bugs need to be reported so
the buggy packages are either fixed or leave testing.
Cheers,
Emilio
Hi,
the first binNMU round has shown some problems, e.g. on casablanca
cd /«PKGBUILDDIR»/obj-x86_64-linux-gnu/src && /usr/bin/c++ -Dcpprest_EXPORTS
-g -O2 -fstack-protector-strong -Wformat -Werror=format-security
-D_FORTIFY_SOURCE=2 -std=c++11 -fno-strict-aliasing -Wall -Wextra
-Wunused-par
On Sun, Nov 01, 2015 at 06:52:08PM +0100, Emilio Pozuelo Monfort wrote:
> >> Do the rdeps build against the new version? IOW, are there any users of the
> >> removed methods?
> >
> > There are users of the removed method. But all known ones should
> > have been changed to either not use it anymor
Control: tags -1 confirmed
On 01/11/15 16:22, Kurt Roeckx wrote:
> On Sun, Nov 01, 2015 at 03:22:29PM +0100, Emilio Pozuelo Monfort wrote:
>> On 26/10/15 23:28, Emilio Pozuelo Monfort wrote:
>>> On 24/10/15 11:22, Kurt Roeckx wrote:
On Wed, Sep 16, 2015 at 10:17:10PM +0100, Jonathan Wiltshire
Processing control commands:
> tags -1 confirmed
Bug #797926 [release.debian.org] transition: openssl: remove SSLv3 methods
Added tag(s) confirmed.
--
797926: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=797926
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
On Sun, Nov 01, 2015 at 03:22:29PM +0100, Emilio Pozuelo Monfort wrote:
> On 26/10/15 23:28, Emilio Pozuelo Monfort wrote:
> > On 24/10/15 11:22, Kurt Roeckx wrote:
> >> On Wed, Sep 16, 2015 at 10:17:10PM +0100, Jonathan Wiltshire wrote:
> >>> On Wed, Sep 09, 2015 at 12:25:16PM +0200, Kurt Roeckx w
On 26/10/15 23:28, Emilio Pozuelo Monfort wrote:
> On 24/10/15 11:22, Kurt Roeckx wrote:
>> On Wed, Sep 16, 2015 at 10:17:10PM +0100, Jonathan Wiltshire wrote:
>>> On Wed, Sep 09, 2015 at 12:25:16PM +0200, Kurt Roeckx wrote:
On Thu, Sep 03, 2015 at 10:36:33PM +0100, Jonathan Wiltshire wrote:
>
On 24/10/15 11:22, Kurt Roeckx wrote:
> On Wed, Sep 16, 2015 at 10:17:10PM +0100, Jonathan Wiltshire wrote:
>> On Wed, Sep 09, 2015 at 12:25:16PM +0200, Kurt Roeckx wrote:
>>> On Thu, Sep 03, 2015 at 10:36:33PM +0100, Jonathan Wiltshire wrote:
> So do I start with an soname change and upload th
On Wed, Sep 16, 2015 at 10:17:10PM +0100, Jonathan Wiltshire wrote:
> On Wed, Sep 09, 2015 at 12:25:16PM +0200, Kurt Roeckx wrote:
> > On Thu, Sep 03, 2015 at 10:36:33PM +0100, Jonathan Wiltshire wrote:
> > > > So do I start with an soname change and upload that to
> > > > experimental?
> > >
> >
On Wed, Sep 09, 2015 at 12:25:16PM +0200, Kurt Roeckx wrote:
> On Thu, Sep 03, 2015 at 10:36:33PM +0100, Jonathan Wiltshire wrote:
> > > So do I start with an soname change and upload that to
> > > experimental?
> >
> > Yes please.
>
> So that has passed the new queue now. Please let me know whe
On Thu, Sep 03, 2015 at 10:36:33PM +0100, Jonathan Wiltshire wrote:
> > So do I start with an soname change and upload that to
> > experimental?
>
> Yes please.
So that has passed the new queue now. Please let me know when I
can start this in unstable.
Kurt
On Thu, Sep 03, 2015 at 11:04:27PM +0200, Kurt Roeckx wrote:
> On Thu, Sep 03, 2015 at 10:06:17PM +0200, Julien Cristau wrote:
> > On Thu, Sep 3, 2015 at 20:51:05 +0200, Kurt Roeckx wrote:
> >
> > > - Just drop the symbols, adding Breaks on at least some
> > > packages like curl and python that
On Thu, Sep 03, 2015 at 10:06:17PM +0200, Julien Cristau wrote:
> On Thu, Sep 3, 2015 at 20:51:05 +0200, Kurt Roeckx wrote:
>
> > - Just drop the symbols, adding Breaks on at least some
> > packages like curl and python that are known to need a rebuild
> > against the changed headers.
> >
>
On Thu, Sep 3, 2015 at 20:51:05 +0200, Kurt Roeckx wrote:
> - Just drop the symbols, adding Breaks on at least some
> packages like curl and python that are known to need a rebuild
> against the changed headers.
>
Definitely not.
Cheers,
Julien
signature.asc
Description: Digital signature
user release.debian@packages.debian.org
usertag 797926 transition
On Thu, Sep 03, 2015 at 08:51:05PM +0200, Kurt Roeckx wrote:
> My question is how you want to proceed with this. I see a few
> options:
> - Change the soname, rebuild everything against that new soname.
> - Just drop the symbol
Package: release.debian.org
Hi,
I would like to remove the last support for SSLv3 in openssl.
This means that I'll be dropping 3 symbols from the shared
library:
SSLv3_method();
SSLv3_server_method();
SSLv3_client_method();
Those can still be used to set up SSLv3 connections, while using
the SSL
22 matches
Mail list logo