- Mar 01, 2023
-
-
Andre Moreira Magalhaes authored
Signed-off-by:
Andre Moreira Magalhaes <andre.magalhaes@collabora.com>
-
- Feb 08, 2023
-
-
Apertis CI robot authored
Signed-off-by:
Apertis CI robot <noreply+not_a_robot@apertis.org>
-
Ritesh Raj Sarraf authored
-
Ritesh Raj Sarraf authored
- Jun 28, 2022
-
-
Ritesh Raj Sarraf authored
Signed-off-by:
Ritesh Raj Sarraf <ritesh.sarraf@collabora.com>
-
Ritesh Raj Sarraf authored
Merge remote-tracking branch 'origin/apertis/v2023dev3' into proposed-updates/debian/bullseye-security/edae0de8 * origin/apertis/v2023dev3: Release openssl version 1.1.1n-0+deb11u1+apertis1 Disable failing test test/recipes/80-test_ssl_new.t Refresh the automatically detected licensing information Release openssl version 1.1.1n-0+deb11u1+apertis0 Release openssl version 1.1.1k-1+deb11u2+apertis0 Release openssl version 1.1.1k-1+apertis0 Refresh the automatically detected licensing information Release openssl version 1.1.1j-1apertis1 debian/apertis/gitlab-ci.yml: Drop since we use an external definition Manually merge the d/p/series file Releasing apertis version 1.1.1d+fromdebian-0+deb10u4. Import Debian changes 1.1.1d-0+deb10u4 copyright: Add licensing metadata Release openssl version 1.1.1d+fromdebian-0+deb10u3 debian/apertis/component: Set to target Import Apertis version 1.1.1a-1
- Jun 22, 2022
-
-
Ritesh Raj Sarraf authored
The test/recipes/80-test_ssl_new.t test is reported failing to build in the Apertis build environment. Upon investigating further, it is also reported to be failing to build in the Debian Reproducible Builds build environment. To unblock on the Apertis side, this MR proposes to disable the failing test. Signed-off-by:
Ritesh Raj Sarraf <ritesh.sarraf@collabora.com>
- Mar 28, 2022
-
-
Emanuele Aina authored
-
Emanuele Aina authored
-
Apertis CI robot authored
- Aug 24, 2021
-
- Jun 15, 2021
-
-
Signed-off-by:
Apertis CI robot <not_a_robot@apertis.org>
-
- Mar 23, 2021
-
-
Signed-off-by:
Ritesh Raj Sarraf <ritesh.sarraf@collabora.com>
-
Emanuele Aina authored
Apertis has moved to using external references in the CI config path setting for the packagign repositories, so the gitlab-ci.yml embedded in the repository is no longer needed. Signed-off-by:
Emanuele Aina <emanuele.aina@collabora.com>
-
As it seems to have been diverged from buster-security/buster-backports Signed-off-by:
Ritesh Raj Sarraf <ritesh.sarraf@collabora.com>
-
- Mar 18, 2021
-
-
Ritesh Raj Sarraf authored
* origin/debian/bullseye: Import Upstream version 1.1.1j Import Debian changes 1.1.1d-0+deb10u4
-
- Mar 06, 2021
-
- Feb 16, 2021
-
-
Sebastian Andrzej Siewior authored
openssl (1.1.1j-1) unstable; urgency=medium * New upstream version. - CVE-2021-23841 (NULL pointer deref in X509_issuer_and_serial_hash()). - CVE-2021-23840 (Possible overflow of the output length argument in EVP_CipherUpdate(), EVP_EncryptUpdate() and EVP_DecryptUpdate()). openssl (1.1.1i-3) unstable; urgency=medium * Cherry-pick a patch from upstream to address #13931. * Enable LFS. Thanks to Dan Nicholson for debugging (Closes: #923479). openssl (1.1.1i-2) unstable; urgency=medium * Apply two patches from upstream to address x509 related regressions. openssl (1.1.1i-1) unstable; urgency=medium * New upstream version. - CVE-2020-1971 (EDIPARTYNAME NULL pointer de-reference). - Restore rejection of expired trusted (root) certificate (Closes: #976465). openssl (1.1.1h-1) unstable; urgency=medium * New upstream version * Disable CAPI engine, it is designed for Windows. openssl (1.1.1g-1) unstable; urgency=medium * New upstream version - CVE-2020-1967 (Segmentation fault in SSL_check_chain). openssl (1.1.1f-1) unstable; urgency=medium * New upstream version - Revert the change of EOF detection to avoid regressions in applications. (Closes: #955442). openssl (1.1.1e-1) unstable; urgency=medium * Use dh-compat level 12. * New upstream version - CVE-2019-1551 (Overflow in the x64_64 Montgomery squaring procedure), (Closes: #947949). * Update symbol list. * Update Standards-Version to 4.5.0. No changes required. * Add musl configurations (Closes: #941765). openssl (1.1.1d-2) unstable; urgency=medium * Reenable AES-CBC-HMAC-SHA ciphers (Closes: #941987). openssl (1.1.1d-1) unstable; urgency=medium * New upstream version - CVE-2019-1549 (Fixed a fork protection issue). - CVE-2019-1547 (Compute ECC cofactors if not provided during EC_GROUP construction). - CVE-2019-1563 (Fixed a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey). * Update symbol list
-
- Dec 09, 2020
-
-
Sebastian Andrzej Siewior authored
openssl (1.1.1d-0+deb10u4) buster-security; urgency=medium * CVE-2020-1971 (EDIPARTYNAME NULL pointer de-reference).
- Dec 07, 2020
-
-
Sebastian Andrzej Siewior authored
openssl (1.1.1d-0+deb10u4) buster-security; urgency=medium * CVE-2020-1971 (EDIPARTYNAME NULL pointer de-reference).
-
- Jul 30, 2020
-
-
Emanuele Aina authored
Signed-off-by:
Emanuele Aina <emanuele.aina@collabora.com>
-
- Apr 30, 2020
-
- Apr 29, 2020
-
- Apr 20, 2020
-
-
Sebastian Andrzej Siewior authored
openssl (1.1.1d-0+deb10u3) buster-security; urgency=medium * CVE-2020-1967 (Segmentation fault in SSL_check_chain).
-