<div dir="ltr"><div dir="ltr"><br></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">Le sam. 24 août 2024 à 13:52, Paul Gevers <<a href="mailto:elbrus@debian.org">elbrus@debian.org</a>> a écrit :<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Hi Sebastian,<br>
<br>
On Sat, 17 Aug 2024 23:25:28 +0200 Sebastian Andrzej Siewior <br>
<<a href="mailto:sebastian@breakpoint.cc" target="_blank">sebastian@breakpoint.cc</a>> wrote:<br>
> This is a stable release update of openssl provided upstream. Besides<br>
> regular fixes it addresses three CVEs which are clasified as minor and<br>
> therefore not yet fixed.<br>
> After this update one CVE remains open which has been clasified as low<br>
> by upstream and requires more than one patch address it and I decided to<br>
> delayed it until 3.0.15 is released.<br>
> <br>
> I am not aware of any fallout at this point.<br>
<br>
Some flaky autopkgtests are failing [1], but nodejs regresses on all <br>
architectures. It *seems* to me that's acceptable, one failure mode is <br>
changed for another, but hopefully you or nodejs maintainers can <br>
confirm, the regression is harmless (doesn't indicate a real issue with <br>
the update).<br></blockquote><div><br></div><div>Indeed, it is harmless.</div><div>Upstream nodejs has fixed this in the 20.x branch by allowing both error codes in the failing test.</div><div> </div><div>Jérémy</div></div></div>