[Pkg-openssl-devel] Bug#334501: marked as done (libcryto.so.0.9.8
cause a SIGFAULT in ssh)
Debian Bug Tracking System
owner at bugs.debian.org
Tue Oct 18 18:18:10 UTC 2005
Your message dated Tue, 18 Oct 2005 11:02:08 -0700
with message-id <E1ERvmq-00015f-00 at spohr.debian.org>
and subject line Bug#334502: fixed in openssl 0.9.8a-2
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 18 Oct 2005 11:07:39 +0000
>From emilioj at udc.es Tue Oct 18 04:07:39 2005
Return-path: <emilioj at udc.es>
Received: from mail.udc.es [193.147.41.3]
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1ERpJj-0007rp-00; Tue, 18 Oct 2005 04:07:39 -0700
Received: from localhost (localhost [127.0.0.1])
by mail.udc.es ("Servidor de correo del SIAIN") with ESMTP id DBA0130A98
for <submit at bugs.debian.org>; Tue, 18 Oct 2005 12:56:07 +0200 (CEST)
Received: from mail.udc.es ([127.0.0.1])
by localhost (mail.udc.es [127.0.0.1]) (amavisd-new, port 10024) with LMTP
id 25611-02-9 for <submit at bugs.debian.org>;
Tue, 18 Oct 2005 12:56:07 +0200 (CEST)
Received: from burgas.des.udc.es (burgas.des.udc.es [193.144.50.46])
(using TLSv1 with cipher AES256-SHA (256/256 bits))
(No client certificate requested)
by mail.udc.es ("Servidor de correo del SIAIN") with ESMTP id B302E30AB0
for <submit at bugs.debian.org>; Tue, 18 Oct 2005 12:49:09 +0200 (CEST)
Received: from emilioj by burgas.des.udc.es with local (Exim 4.54)
id 1ERr6o-000236-TB
for submit at bugs.debian.org; Tue, 18 Oct 2005 13:02:26 +0000
Date: Tue, 18 Oct 2005 13:02:26 +0000
From: Emilio =?iso-8859-1?B?Si4gUGFkcvNu?= <emilioj at udc.es>
To: submit at bugs.debian.org
Subject: libcryto.so.0.9.8 cause a SIGFAULT in ssh
Message-ID: <20051018130226.GA7820 at burgas.des.udc.es>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.5.11
Delivered-To: submit at bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level:
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE
autolearn=no version=2.60-bugs.debian.org_2005_01_02
Package: libssl0.9.8
Version: 0.9.8a-1
I am not sure about whether I should report the bug against this
package, apologies in advance.
The problem arises after the last debian AMD64 update: ssh gets a SIGFAULT
when using the /usr/lib/libcrypto.so.0.9.8 provided with
the 0.9.8a-1 update in AMD64. Just changing the library with a previous
version (just the file libcrypto.so.0.9.8, not the whole package) works
Ok.
System: debian amd64 - linux 2.6.12-1-amd64-k8 - libc6 2.3.5-7
Best regards,
E.
---------------------------------------
Received: (at 334502-close) by bugs.debian.org; 18 Oct 2005 18:09:43 +0000
>From katie at spohr.debian.org Tue Oct 18 11:09:43 2005
Return-path: <katie at spohr.debian.org>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
id 1ERvmq-00015f-00; Tue, 18 Oct 2005 11:02:08 -0700
From: Kurt Roeckx <kurt at roeckx.be>
To: 334502-close at bugs.debian.org
X-Katie: $Revision: 1.56 $
Subject: Bug#334502: fixed in openssl 0.9.8a-2
Message-Id: <E1ERvmq-00015f-00 at spohr.debian.org>
Sender: Archive Administrator <katie at spohr.debian.org>
Date: Tue, 18 Oct 2005 11:02:08 -0700
Delivered-To: 334502-close at bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level:
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 2
Source: openssl
Source-Version: 0.9.8a-2
We believe that the bug you reported is fixed in the latest version of
openssl, which is due to be installed in the Debian FTP archive:
libcrypto0.9.8-udeb_0.9.8a-2_i386.udeb
to pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8a-2_i386.udeb
libssl-dev_0.9.8a-2_i386.deb
to pool/main/o/openssl/libssl-dev_0.9.8a-2_i386.deb
libssl0.9.8-dbg_0.9.8a-2_i386.deb
to pool/main/o/openssl/libssl0.9.8-dbg_0.9.8a-2_i386.deb
libssl0.9.8_0.9.8a-2_i386.deb
to pool/main/o/openssl/libssl0.9.8_0.9.8a-2_i386.deb
openssl_0.9.8a-2.diff.gz
to pool/main/o/openssl/openssl_0.9.8a-2.diff.gz
openssl_0.9.8a-2.dsc
to pool/main/o/openssl/openssl_0.9.8a-2.dsc
openssl_0.9.8a-2_i386.deb
to pool/main/o/openssl/openssl_0.9.8a-2_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 334502 at bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Kurt Roeckx <kurt at roeckx.be> (supplier of updated openssl package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster at debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Tue, 18 Oct 2005 19:05:53 +0200
Source: openssl
Binary: libssl-dev openssl libssl0.9.8-dbg libcrypto0.9.8-udeb libssl0.9.8
Architecture: source i386
Version: 0.9.8a-2
Distribution: unstable
Urgency: low
Maintainer: Debian OpenSSL Team <pkg-openssl-devel at lists.alioth.debian.org>
Changed-By: Kurt Roeckx <kurt at roeckx.be>
Description:
libcrypto0.9.8-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl0.9.8 - SSL shared libraries
libssl0.9.8-dbg - Symbol tables for libssl and libcrypt
openssl - Secure Socket Layer (SSL) binary and related cryptographic tools
Closes: 334501 334502 334542
Changes:
openssl (0.9.8a-2) unstable; urgency=low
.
* Add Build-Dependency on m4, since sparc needs it to generate
it's assembler files. (Closes: #334542)
* Don't use rc4-x86_64.o on amd64 for now, it seems to be broken
and causes a segfault. (Closes: #334501, #334502)
Files:
96f514fa408dc8e762a57f19ed23783a 792 utils optional openssl_0.9.8a-2.dsc
70c8c2f1116965b485041be4b546c502 30235 utils optional openssl_0.9.8a-2.diff.gz
b90e699666be3377e2d98ca60c5fe8a3 976658 utils optional openssl_0.9.8a-2_i386.deb
360d3deb2f39acbba274cc30c7c42c54 2645862 libs important libssl0.9.8_0.9.8a-2_i386.deb
49683286137e7a2e9bb87d6218e1ab95 508528 debian-installer optional libcrypto0.9.8-udeb_0.9.8a-2_i386.udeb
f79cd1894cc72878b351001a89feb87e 2835384 libdevel optional libssl-dev_0.9.8a-2_i386.deb
de96d3ddf8e565e5e2201453b6cfb7f0 5151436 libdevel extra libssl0.9.8-dbg_0.9.8a-2_i386.deb
Package-Type: udeb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
iD8DBQFDVTOvQdwckHJElwsRAm8NAJ4is279134MNoDvQYYxHxVJm7VNZwCdEl3Z
Mb/P/1rpmTaHyXP21Kh21HQ=
=uZFt
-----END PGP SIGNATURE-----
More information about the Pkg-openssl-devel
mailing list