From news at tfgx.de Tue Mar 3 12:02:30 2026 From: news at tfgx.de (Rekord-Jackpot) Date: Tue, 03 Mar 2026 13:02:30 +0100 Subject: [Pkg-openssl-devel] =?utf-8?b?8J+SsCAxNzQgTWlvIOKCrCBTdXBlcnpp?= =?utf-8?q?ehung_am_Freitag_-_11_=E2=82=AC_Rabatt_sichern!?= Message-ID: <767d4930764d8da71de26e97625289a6@tfgx.de> An HTML attachment was scrubbed... URL: From serraoarleen98 at outlook.com Tue Mar 3 16:10:27 2026 From: serraoarleen98 at outlook.com (Arleen Serrao) Date: Tue, 3 Mar 2026 16:10:27 +0000 Subject: [Pkg-openssl-devel] Instrument Message-ID: Dear Pkgopenssldevel, I hope this message finds you well. A friend of mine is giving away her late husband's Yamaha piano to an instrument lover. It's a special piece with a lot of meaning, and she'd be so happy if it went to someone who truly appreciates music. She'd be delighted to share its history, condition, or other details if you're curious. Thank you for considering this, any help or advice is appreciated. With appreciation, Arleen -------------- next part -------------- An HTML attachment was scrubbed... URL: From news at hkxs.de Wed Mar 11 11:04:51 2026 From: news at hkxs.de (Doppelter Jackpot) Date: Wed, 11 Mar 2026 12:04:51 +0100 Subject: [Pkg-openssl-devel] =?utf-8?q?Gewinne_mit_6_Feldern_224_Mio=2E_?= =?utf-8?b?4oKs?= Message-ID: <7af4978a16ede73d87d1309a2864ef62@hkxs.de> An HTML attachment was scrubbed... URL: From ftpmaster at ftp-master.debian.org Thu Mar 12 20:47:07 2026 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Thu, 12 Mar 2026 20:47:07 +0000 Subject: [Pkg-openssl-devel] Processing of openssl_3.6.1-2_source.changes Message-ID: openssl_3.6.1-2_source.changes uploaded successfully to localhost along with the files: openssl_3.6.1-2.dsc openssl_3.6.1-2.debian.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org) From ftpmaster at ftp-master.debian.org Thu Mar 12 20:51:32 2026 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Thu, 12 Mar 2026 20:51:32 +0000 Subject: [Pkg-openssl-devel] openssl_3.6.1-2_source.changes ACCEPTED into unstable Message-ID: Thank you for your contribution to Debian. Accepted: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Thu, 12 Mar 2026 21:00:23 +0100 Source: openssl Architecture: source Version: 3.6.1-2 Distribution: unstable Urgency: medium Maintainer: Debian OpenSSL Team Changed-By: Sebastian Andrzej Siewior Changes: openssl (3.6.1-2) unstable; urgency=medium . * Upload to unstable Checksums-Sha1: 0a219c638ab3deb864936e139f68c8f0ac0b952c 2675 openssl_3.6.1-2.dsc 4608a007df15136cd52ee6baa0e1969255d2fe79 48112 openssl_3.6.1-2.debian.tar.xz Checksums-Sha256: 52237b79b96df257e1fe0144a588f746b9b7ecb7b61b09fa08b101d5336b15fe 2675 openssl_3.6.1-2.dsc bf3072727d466a79f39b98dd19c21ada71e81e22a3c540d4ab4e600538b61af3 48112 openssl_3.6.1-2.debian.tar.xz Files: dd9b02df37ffba09da9f2b886658fb09 2675 utils optional openssl_3.6.1-2.dsc fdc2c500cc8b09c30742bb468dd54012 48112 utils optional openssl_3.6.1-2.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQGzBAEBCgAdFiEEV4kucFIzBRM39v3RBWQfF1cS+lsFAmmzJQIACgkQBWQfF1cS +lsW9wv+KRCNmVcIDnDbN5q8cVWCJafQxve38QVNQfgaCf1S4v98sQrXeIvW92ou ZOJlMGHmdozIjFhq00pSE5Rkn8c9WieZNrA0msjA3vJXSJE+xjXHfw2QeehZ/aaz xxettQNoQAv2UK2GfxMDJgeoC7U5y5WZ+wsUQ9Q1WGm5K4vEieytRbOw8meTNIFk LoIvdhfZXmJ5RTn7eTxOtrCqm/ik9VioV/tr+zcBPRZDXjxZMWtwzCaRtLEduCKM G8mUfONul7qJVVeZOg4Yr4s6nvhenuRTOXGORpko7RkEclMfQOidaYg6R2lXX52P d1e8zsshnfgh7Sp21UOoA1/+n+zt4mnqz9PFFywrSskxoskNRTo99nDtAfZDxQiB hcIzqnmoLjfQ0r7hrDTprNs3OJWn/pUFfKtEjOajaKal2Z1dYEXSqMIxlUd5czwC /uVctRIW8J3RsgspcIppiyDA5Yp2yn2/QNStCuFp2gsthSdSPA11m6/OoMvFkY8V Cz3Ih/q2 =+9CV -----END PGP SIGNATURE----- -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 228 bytes Desc: not available URL: From ftpmaster at ftp-master.debian.org Fri Mar 13 18:36:29 2026 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Fri, 13 Mar 2026 18:36:29 +0000 Subject: [Pkg-openssl-devel] Processing of openssl_4.0.0~alpha1-1_amd64.changes Message-ID: openssl_4.0.0~alpha1-1_amd64.changes uploaded successfully to localhost along with the files: openssl_4.0.0~alpha1-1.dsc openssl_4.0.0~alpha1.orig.tar.gz openssl_4.0.0~alpha1.orig.tar.gz.asc openssl_4.0.0~alpha1-1.debian.tar.xz libcrypto4-udeb_4.0.0~alpha1-1_amd64.udeb libssl-dev_4.0.0~alpha1-1_amd64.deb libssl-doc_4.0.0~alpha1-1_all.deb libssl4-dbgsym_4.0.0~alpha1-1_amd64.deb libssl4-udeb_4.0.0~alpha1-1_amd64.udeb libssl4_4.0.0~alpha1-1_amd64.deb openssl-dbgsym_4.0.0~alpha1-1_amd64.deb openssl-provider-fips-dbgsym_4.0.0~alpha1-1_amd64.deb openssl-provider-fips_4.0.0~alpha1-1_amd64.deb openssl-provider-legacy-dbgsym_4.0.0~alpha1-1_amd64.deb openssl-provider-legacy_4.0.0~alpha1-1_amd64.deb openssl_4.0.0~alpha1-1_amd64.buildinfo openssl_4.0.0~alpha1-1_amd64.deb Greetings, Your Debian queue daemon (running on host usper.debian.org) From ftpmaster at ftp-master.debian.org Fri Mar 13 18:40:28 2026 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Fri, 13 Mar 2026 18:40:28 +0000 Subject: [Pkg-openssl-devel] openssl_4.0.0~alpha1-1_amd64.changes is NEW Message-ID: binary:libcrypto4-udeb is NEW. binary:libssl4 is NEW. binary:libssl4-udeb is NEW. binary:libcrypto4-udeb is NEW. binary:libssl4-udeb is NEW. binary:libssl4 is NEW. Your package has been put into the NEW queue, which requires manual action from the ftpteam to process. The upload was otherwise valid (it had a good OpenPGP signature and file hashes are valid), so please be patient. Packages are routinely processed through to the archive, and do feel free to browse the NEW queue[1]. If there is an issue with the upload, you will receive an email from a member of the ftpteam. If you have any questions, you may reply to this email. [1]: https://ftp-master.debian.org/new.html or https://ftp-master.debian.org/backports-new.html for *-backports -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 228 bytes Desc: not available URL: From ftpmaster at ftp-master.debian.org Fri Mar 13 20:10:30 2026 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Fri, 13 Mar 2026 20:10:30 +0000 Subject: [Pkg-openssl-devel] openssl_4.0.0~alpha1-1_amd64.changes ACCEPTED into experimental Message-ID: Thank you for your contribution to Debian. Accepted: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Fri, 13 Mar 2026 18:16:34 +0100 Source: openssl Binary: libcrypto4-udeb libssl-dev libssl-doc libssl4 libssl4-dbgsym libssl4-udeb openssl openssl-dbgsym openssl-provider-fips openssl-provider-fips-dbgsym openssl-provider-legacy openssl-provider-legacy-dbgsym Architecture: source amd64 all Version: 4.0.0~alpha1-1 Distribution: experimental Urgency: medium Maintainer: Debian OpenSSL Team Changed-By: Sebastian Andrzej Siewior Description: libcrypto4-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb) libssl-dev - Secure Sockets Layer toolkit - development files libssl-doc - Secure Sockets Layer toolkit - development documentation libssl4 - Secure Sockets Layer toolkit - shared libraries libssl4-udeb - ssl shared library - udeb (udeb) openssl - Secure Sockets Layer toolkit - cryptographic utility openssl-provider-fips - Secure Sockets Layer toolkit - cryptographic utility openssl-provider-legacy - Secure Sockets Layer toolkit - cryptographic utility Closes: 1126531 Changes: openssl (4.0.0~alpha1-1) experimental; urgency=medium . * Import 4.0.0-alpha1 (Closes: #1126531). * Update Standards-Version. Checksums-Sha1: 21c08eaf2d3b20e84f6a3da7320dcdde420cd5d0 2739 openssl_4.0.0~alpha1-1.dsc e63b7915210afaaa1235846a33c9c7c6cc428098 55013435 openssl_4.0.0~alpha1.orig.tar.gz b5904f155ff0496bae35f1aabd5de7c50a7ac2e0 833 openssl_4.0.0~alpha1.orig.tar.gz.asc 4c975a60eab7479f83bba67f933f9dc2c36c5e2e 47468 openssl_4.0.0~alpha1-1.debian.tar.xz aabbde804496f472b03926e542065831523fcc29 2025024 libcrypto4-udeb_4.0.0~alpha1-1_amd64.udeb 47c198503636e436f19baa8670a20b5b17a4c9ff 3005140 libssl-dev_4.0.0~alpha1-1_amd64.deb fdc3b90d12657244f6485ef57575730309a4d857 2271492 libssl-doc_4.0.0~alpha1-1_all.deb 09ed43c84596dc997460b31fd7dc16ba6b333af8 6234780 libssl4-dbgsym_4.0.0~alpha1-1_amd64.deb 83b21bfd6e2759b0e48cb5e9323980eae6293ccc 402860 libssl4-udeb_4.0.0~alpha1-1_amd64.udeb 0d173502e27aa8b4d32f3ac73b68e74cf8667495 2445572 libssl4_4.0.0~alpha1-1_amd64.deb c434a6160c10f4c75e9d3cb181949e4776881c26 761860 openssl-dbgsym_4.0.0~alpha1-1_amd64.deb cb58a41ad460f1afe4ad47ead1aa98f424547ef5 1946120 openssl-provider-fips-dbgsym_4.0.0~alpha1-1_amd64.deb 9bd92338b289566f563408a0a554a9207cbfecb0 1150300 openssl-provider-fips_4.0.0~alpha1-1_amd64.deb 06007f614b99683d2a9da0856062ad37c9ffaee9 106052 openssl-provider-legacy-dbgsym_4.0.0~alpha1-1_amd64.deb 8983b4c9b3f815339bef47ef22640d1daf58fe9c 319568 openssl-provider-legacy_4.0.0~alpha1-1_amd64.deb 5d4919d0625b58c31552d07fb1503d9216db41ca 9211 openssl_4.0.0~alpha1-1_amd64.buildinfo 53cbcbe4274bf9a420ee8d5424bb07c5cd095ed8 1545484 openssl_4.0.0~alpha1-1_amd64.deb Checksums-Sha256: 945a20f0071f650173eff2d0a935deab8c80d28892a4b0d9e9cbc25c166b1270 2739 openssl_4.0.0~alpha1-1.dsc 4b99f0e2f2819d4c0bb756fb7f71a7ad772f495a1d369e734da64b385efe7ccb 55013435 openssl_4.0.0~alpha1.orig.tar.gz daab734956c88ca20a9bb47bad41116dc4d265ec33fa108adb1ebca6c1c36de8 833 openssl_4.0.0~alpha1.orig.tar.gz.asc afaecc95af68dae2929c18e12338c5553f261a7d755ed1d24eb9126451b64ee1 47468 openssl_4.0.0~alpha1-1.debian.tar.xz ad72ff5ee33cc6c47c3c5c3992d30ed0faffff0f4c169ce7b2677532b842de56 2025024 libcrypto4-udeb_4.0.0~alpha1-1_amd64.udeb 9d5a68b0df2d8b61bbeb0de3407cb6b070337db5eab0eec307b048a795f90a1c 3005140 libssl-dev_4.0.0~alpha1-1_amd64.deb c0d5dc42476850afc82d62bf017794f89be827a0cb89c455e71f8895f24f352a 2271492 libssl-doc_4.0.0~alpha1-1_all.deb e8671d559e050a0900371655f31f5ff8b39e613e8b2eb788754181e560b3c6fa 6234780 libssl4-dbgsym_4.0.0~alpha1-1_amd64.deb 1e83f7501ea9ac9ee090d1e22fd49347c87617154e8f243daf1b9c8d269193b2 402860 libssl4-udeb_4.0.0~alpha1-1_amd64.udeb 101c7f6a2c2ec0cd9428badfabf1573408953d2f38bfa359f9155f21e494fac6 2445572 libssl4_4.0.0~alpha1-1_amd64.deb 185a99f7815c8f95415dcd6313e8c56534773f9053f090f770624056b864b38e 761860 openssl-dbgsym_4.0.0~alpha1-1_amd64.deb 2196149e26e14d0cdd4d10dd7cf9f061829f9caf4ca7cbdcd3dc58f99fd5dc48 1946120 openssl-provider-fips-dbgsym_4.0.0~alpha1-1_amd64.deb 6314f70be20d9d8c59ceb187661ee269a941d2b23133534a3eb4eb4aa67ec568 1150300 openssl-provider-fips_4.0.0~alpha1-1_amd64.deb b15223e799f9abec638e11f6454b81f93e79c8763baa374105ac84265486731c 106052 openssl-provider-legacy-dbgsym_4.0.0~alpha1-1_amd64.deb 8b7aba16ea5090d409f643cc6114dcb56e41a2866bc3a6b045b3102bd739f5c2 319568 openssl-provider-legacy_4.0.0~alpha1-1_amd64.deb 27ace755199ee65c1d31548ffd77bac610d81876f3808902e37ab4f983275b80 9211 openssl_4.0.0~alpha1-1_amd64.buildinfo e874ef5160a6bbfec7de02acd66b61e1c582685e198d8dba98bb87a2003d0b43 1545484 openssl_4.0.0~alpha1-1_amd64.deb Files: 3f37e68e7133ddfef269a24bf5fa4ced 2739 utils optional openssl_4.0.0~alpha1-1.dsc c6b579827f40de7acfad40933ed13b74 55013435 utils optional openssl_4.0.0~alpha1.orig.tar.gz 6765e1108ecd1c9c1cb6b30dfb847a58 833 utils optional openssl_4.0.0~alpha1.orig.tar.gz.asc 244d90f987109db393779e61b3c52fb7 47468 utils optional openssl_4.0.0~alpha1-1.debian.tar.xz ffa3eb53d2f2e37fbe1da7248c4c545c 2025024 debian-installer optional libcrypto4-udeb_4.0.0~alpha1-1_amd64.udeb 445365bda5741b95e2752b3aa1f16d3b 3005140 libdevel optional libssl-dev_4.0.0~alpha1-1_amd64.deb 0ba97d05d5e4509178498c4ce78cb7b8 2271492 doc optional libssl-doc_4.0.0~alpha1-1_all.deb d29e59df9479995e3208f7e426730d74 6234780 debug optional libssl4-dbgsym_4.0.0~alpha1-1_amd64.deb f798e9b9771f0b8d5ba738e18361778b 402860 debian-installer optional libssl4-udeb_4.0.0~alpha1-1_amd64.udeb 17c08a7f2092552fecf975a6a40bc41e 2445572 libs optional libssl4_4.0.0~alpha1-1_amd64.deb 0b3694cc7b62be4f55346bc40e8dd8b2 761860 debug optional openssl-dbgsym_4.0.0~alpha1-1_amd64.deb 5fbf884b93e4e49eac14559b67095162 1946120 debug optional openssl-provider-fips-dbgsym_4.0.0~alpha1-1_amd64.deb 38f2da0a8f3393f42cc8ada42205bf75 1150300 utils optional openssl-provider-fips_4.0.0~alpha1-1_amd64.deb 5a78ac8b0e6a8a1770ade96b2707b7b8 106052 debug optional openssl-provider-legacy-dbgsym_4.0.0~alpha1-1_amd64.deb df245053be1354157e4ed44784bf3ccf 319568 utils optional openssl-provider-legacy_4.0.0~alpha1-1_amd64.deb 2f57786f2c1051f86913e2d271a647b4 9211 utils optional openssl_4.0.0~alpha1-1_amd64.buildinfo 37adfaee4c61a1ba6011d7675492d905 1545484 utils optional openssl_4.0.0~alpha1-1_amd64.deb -----BEGIN PGP SIGNATURE----- iQGzBAEBCgAdFiEEV4kucFIzBRM39v3RBWQfF1cS+lsFAmm0WFYACgkQBWQfF1cS +lu+WAv/X0i8vaYPZIjtitzUsEJdF83gYFeVmkYaCQ/q439KzpukIsW1hPl+IuPb /mFZ15J3Wii5xJypean0XqhpH6C0PSPmZ/7u+bovpqMWsTwcU5qxknKNuNeIyRTH F0XG8JYOcAA3EMCkS9NBjuPcRKWWo5piFMRsygZ43Mzh5+WgWyTjOyQ/ADtdqVlM Yl30ndsNmAUp6vxJtyc7bfmRFjHv5RTndo9+214DpXsIbws91+KWky4RMg0kGSLZ 9MLQXUIgNUqyUdrnfOx3LAWX5sO5QW5mv+zZnQz3+cm2Iyy5qVZ03Ct7MChUhjT0 4lQ5pyBGrHMZkNN3FSOQpE9WrlQU7zpAywW0ZXLaTj2pWF6c390shCi8O0Ndg56C FIu/TgXCwh8Z3Jnvo/0nTqRTJ94ZU5lfkZqkezervCBFchFoNlzz17NLxxa0XUAI p/NXvTPe+x+6WC5bZRHS45rnkLodSznXs8WyJG73snowiVnflg/kzRq5LaL3VlxY QgFbZUqk =J0t0 -----END PGP SIGNATURE----- -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 228 bytes Desc: not available URL: From owner at bugs.debian.org Fri Mar 13 20:13:02 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Fri, 13 Mar 2026 20:13:02 +0000 Subject: [Pkg-openssl-devel] Bug#1126531: marked as done (openssl: FTBFS on ppc64 while trying to link ELFv1 with ELFv2 code) References: <176958480419.3617879.7003156543140456923.reportbug@login1.physik.fu-berlin.de> Message-ID: Your message dated Fri, 13 Mar 2026 20:10:46 +0000 with message-id and subject line Bug#1126531: fixed in openssl 4.0.0~alpha1-1 has caused the Debian Bug report #1126531, regarding openssl: FTBFS on ppc64 while trying to link ELFv1 with ELFv2 code to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 1126531: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126531 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: John Paul Adrian Glaubitz Subject: openssl: FTBFS on ppc64 while trying to link ELFv1 with ELFv2 code Date: Wed, 28 Jan 2026 08:20:04 +0100 Size: 5372 URL: -------------- next part -------------- An embedded message was scrubbed... From: Debian FTP Masters Subject: Bug#1126531: fixed in openssl 4.0.0~alpha1-1 Date: Fri, 13 Mar 2026 20:10:46 +0000 Size: 11712 URL: From owner at bugs.debian.org Fri Mar 13 20:41:03 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Fri, 13 Mar 2026 20:41:03 +0000 Subject: [Pkg-openssl-devel] Processed: openssl: CVE-2026-2673 References: <177343437335.2724481.8582007866155904056.reportbug@eldamar.lan> <177343437335.2724481.8582007866155904056.reportbug@eldamar.lan> Message-ID: Processing control commands: > found -1 3.5.5-1 Bug #1130650 [src:openssl] openssl: CVE-2026-2673 Marked as found in versions openssl/3.5.5-1. > found -1 3.5.4-1~deb13u1 Bug #1130650 [src:openssl] openssl: CVE-2026-2673 Marked as found in versions openssl/3.5.4-1~deb13u1. > found -1 3.5.4-1 Bug #1130650 [src:openssl] openssl: CVE-2026-2673 Marked as found in versions openssl/3.5.4-1. -- 1130650: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130650 Debian Bug Tracking System Contact owner at bugs.debian.org with problems From carnil at debian.org Fri Mar 13 20:39:33 2026 From: carnil at debian.org (Salvatore Bonaccorso) Date: Fri, 13 Mar 2026 21:39:33 +0100 Subject: [Pkg-openssl-devel] Bug#1130650: openssl: CVE-2026-2673 Message-ID: <177343437335.2724481.8582007866155904056.reportbug@eldamar.lan> Source: openssl Version: 3.6.1-2 Severity: important Tags: security upstream X-Debbugs-Cc: carnil at debian.org, Debian Security Team Control: found -1 3.5.5-1 Control: found -1 3.5.4-1~deb13u1 Control: found -1 3.5.4-1 Hi, The following vulnerability was published for openssl. CVE-2026-2673[0]: | Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the | expected preferred key exchange group when its key exchange group | configuration includes the default by using the 'DEFAULT' keyword. | Impact summary: A less preferred key exchange may be used even when | a more preferred group is supported by both client and server, if | the group was not included among the client's initial predicated | keyshares. This will sometimes be the case with the new hybrid post- | quantum groups, if the client chooses to defer their use until | specifically requested by the server. If an OpenSSL TLS 1.3 | server's configuration uses the 'DEFAULT' keyword to interpolate the | built-in default group list into its own configuration, perhaps | adding or removing specific elements, then an implementation defect | causes the 'DEFAULT' list to lose its 'tuple' structure, and all | server-supported groups were treated as a single sufficiently secure | 'tuple', with the server not sending a Hello Retry Request (HRR) | even when a group in a more preferred tuple was mutually supported. | As a result, the client and server might fail to negotiate a | mutually supported post-quantum key agreement group, such as | 'X25519MLKEM768', if the client's configuration results in only | 'classical' groups (such as 'X25519' being the only ones in the | client's initial keyshare prediction). OpenSSL 3.5 and later | support a new syntax for selecting the most preferred TLS 1.3 key | agreement group on TLS servers. The old syntax had a single 'flat' | list of groups, and treated all the supported groups as sufficiently | secure. If any of the keyshares predicted by the client were | supported by the server the most preferred among these was selected, | even if other groups supported by the client, but not included in | the list of predicted keyshares would have been more preferred, if | included. The new syntax partitions the groups into distinct | 'tuples' of roughly equivalent security. Within each tuple the most | preferred group included among the client's predicted keyshares is | chosen, but if the client supports a group from a more preferred | tuple, but did not predict any corresponding keyshares, the server | will ask the client to retry the ClientHello (by issuing a Hello | Retry Request or HRR) with the most preferred mutually supported | group. The above works as expected when the server's configuration | uses the built-in default group list, or explicitly defines its own | list by directly defining the various desired groups and group | 'tuples'. No OpenSSL FIPS modules are affected by this issue, the | code in question lies outside the FIPS boundary. OpenSSL 3.6 and | 3.5 are vulnerable to this issue. OpenSSL 3.6 users should upgrade | to OpenSSL 3.6.2 once it is released. OpenSSL 3.5 users should | upgrade to OpenSSL 3.5.6 once it is released. OpenSSL 3.4, 3.3, | 3.0, 1.0.2 and 1.1.1 are not affected by this issue. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2026-2673 https://www.cve.org/CVERecord?id=CVE-2026-2673 [1] https://openssl-library.org/news/secadv/20260313.txt Regards, Salvatore From sebastian at breakpoint.cc Fri Mar 13 21:12:52 2026 From: sebastian at breakpoint.cc (Sebastian Andrzej Siewior) Date: Fri, 13 Mar 2026 22:12:52 +0100 Subject: [Pkg-openssl-devel] Bug#1130650: Bug#1130650: openssl: CVE-2026-2673 In-Reply-To: <177343437335.2724481.8582007866155904056.reportbug@eldamar.lan> References: <177343437335.2724481.8582007866155904056.reportbug@eldamar.lan> <177343437335.2724481.8582007866155904056.reportbug@eldamar.lan> Message-ID: <20260313211252.LIOGluhc@breakpoint.cc> Control: found -1 3.5.0-1 From owner at bugs.debian.org Fri Mar 13 21:15:01 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Fri, 13 Mar 2026 21:15:01 +0000 Subject: [Pkg-openssl-devel] Processed: Re: Bug#1130650: openssl: CVE-2026-2673 References: <20260313211252.LIOGluhc@breakpoint.cc> <177343437335.2724481.8582007866155904056.reportbug@eldamar.lan> Message-ID: Processing control commands: > found -1 3.5.0-1 Bug #1130650 [src:openssl] openssl: CVE-2026-2673 Marked as found in versions openssl/3.5.0-1. -- 1130650: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130650 Debian Bug Tracking System Contact owner at bugs.debian.org with problems From nespresso at hoteladmin.ro Sun Mar 15 12:35:12 2026 From: nespresso at hoteladmin.ro (Nespresso) Date: Sun, 15 Mar 2026 12:35:12 +0000 Subject: [Pkg-openssl-devel] Ihre Nespresso punkte verfallen in kurze! Message-ID: <00000000000064c4f5064d0f551b@google.com> Status Icon Letzter Aufruf: 72 Stunden ?brig Nur noch kurz. Aktualisierung f?r: pkg-openssl-devel at lists.alioth.debian.org Ihr aktueller Kontostand 524 Gesammelte Treuepunkte Verf?gbar bis zum: 18. M?rz 2026 Dies ist eine wichtige Erinnerung: In drei Tagen verf?llt Ihr gesamtes Punkteguthaben. Nutzen Sie die verbleibende Zeit, um Ihre Punkte gegen hochwertige Kaffeesets oder Zubeh?r einzul?sen, bevor der Saldo gel?scht wird. Guthaben jetzt einl?sen Der Zugriff erfolgt ?ber Ihr verschl?sseltes Nutzerkonto. Support-Team Treueportal Pariser Platz 4a ? 10117 Berlin ? Deutschland Pr?ferenzen ? Datenschutzhinweis -------------- next part -------------- An HTML attachment was scrubbed... URL: From sebastian at breakpoint.cc Tue Mar 17 20:33:09 2026 From: sebastian at breakpoint.cc (Sebastian Andrzej Siewior) Date: Tue, 17 Mar 2026 21:33:09 +0100 Subject: [Pkg-openssl-devel] Bug#1131121: openssl: qatengine breaks with openssl 3.6 Message-ID: <20260317203309.VXGUS-Kk@breakpoint.cc> Package: src:openssl Version: 3.6.0-1 Severity: important control: affects -1 src:qatengine User: pkg-openssl-devel at lists.alioth.debian.org Usertags: openssl-3.6 control: forwarded -1 https://github.com/openssl/openssl/issues/30473 Placeholder Sebastian From owner at bugs.debian.org Tue Mar 17 20:35:03 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Tue, 17 Mar 2026 20:35:03 +0000 Subject: [Pkg-openssl-devel] Processed: openssl: qatengine breaks with openssl 3.6 References: <20260317203309.VXGUS-Kk@breakpoint.cc> <20260317203309.VXGUS-Kk@breakpoint.cc> Message-ID: Processing control commands: > affects -1 src:qatengine Bug #1131121 [src:openssl] openssl: qatengine breaks with openssl 3.6 Added indication that 1131121 affects src:qatengine > forwarded -1 https://github.com/openssl/openssl/issues/30473 Bug #1131121 [src:openssl] openssl: qatengine breaks with openssl 3.6 Set Bug forwarded-to-address to 'https://github.com/openssl/openssl/issues/30473'. -- 1131121: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131121 Debian Bug Tracking System Contact owner at bugs.debian.org with problems From news at tfgx.de Wed Mar 18 04:00:52 2026 From: news at tfgx.de (=?utf-8?Q?Oliven=C3=B6l?= extra) Date: Wed, 18 Mar 2026 05:00:52 +0100 Subject: [Pkg-openssl-devel] =?utf-8?q?Ein_einzigartiges_Geschenk_und_Oli?= =?utf-8?q?ven=C3=B6l_f=C3=BCrs_ganze_Leben!?= Message-ID: <4cad0d21cc459e6f0645526d818b62a3@tfgx.de> An HTML attachment was scrubbed... URL: From noreply7acb7r9y at ddhelp.com.br Wed Mar 18 07:26:24 2026 From: noreply7acb7r9y at ddhelp.com.br (Lenovo Kundenauswahl) Date: Wed, 18 Mar 2026 07:26:24 +0000 Subject: [Pkg-openssl-devel] =?utf-8?q?Best=C3=A4tigung=3A_Ihr_LENOVO_Ide?= =?utf-8?q?aPad_Slim_3_wartet_auf_Sie!=E2=80=8D?= Message-ID: <00000000000090cb31064d475ea5@google.com> March 16, 2026 Gl?ckwunsch! Lenovo IdeaPad Du wurdest ausgew?hlt, die Chance auf eine brandneue LENOVO IdeaPad Slim 3 zu erhalten! Um deine Belohnung der Stufe 1 zu beanspruchen, beantworte einfach ein paar kurze Fragen zu deiner Erfahrung. Umfrage starten ? Achtung: Dieses Umfrageangebot l?uft heute ab, March 31, 2026 wtfithnvdskmwrbcifyrsrvtmsqlowlauwvq -------------- next part -------------- An HTML attachment was scrubbed... URL: From helmut at subdivi.de Thu Mar 12 18:13:52 2026 From: helmut at subdivi.de (Helmut Grohne) Date: Thu, 12 Mar 2026 19:13:52 +0100 Subject: [Pkg-openssl-devel] Bug#1131164: openssl: add more musl targets Message-ID: <20260312181352.GA70364@subdivi.de> Source: openssl Severity: wishlist Tags: ftbfs patch User: helmutg at debian.org Usertags: rebootstrap Hi, I was trying to booststrap Debian for musl-linux-amd64 and ran into a build failure of openssl. The package needs a target definition for every single Debian architecture and this one is missing. I suggest adding all musl variants of all Debian release architectures. Please find a patch attached. Helmut -------------- next part -------------- A non-text attachment was scrubbed... Name: musl.patch Type: text/x-diff Size: 1047 bytes Desc: not available URL: From owner at bugs.debian.org Wed Mar 18 18:11:16 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Wed, 18 Mar 2026 18:11:16 +0000 Subject: [Pkg-openssl-devel] Processed: unarchiving 1013309, reassign 1012843 to libssl3, forcibly merging 1013309 1012843, affects 1013309 References: <1773857419-4093-bts-bunk@debian.org> Message-ID: Processing commands for control at bugs.debian.org: > unarchive 1013309 Bug #1013309 {Done: Sebastian Andrzej Siewior } [libssl3] vlc-cache-gen segfaults while dpkg is processing triggers for libvlc-bin Unarchived Bug 1013309 > reassign 1012843 libssl3 Bug #1012843 [i2pd] i2pd: Default install SEGV Bug reassigned from package 'i2pd' to 'libssl3'. No longer marked as found in versions i2pd/2.41.0-1. Ignoring request to alter fixed versions of bug #1012843 to the same values previously set > forcemerge 1013309 1012843 Bug #1013309 {Done: Sebastian Andrzej Siewior } [libssl3] vlc-cache-gen segfaults while dpkg is processing triggers for libvlc-bin Bug #1012843 [libssl3] i2pd: Default install SEGV Set Bug forwarded-to-address to 'https://github.com/openssl/openssl/issues/18669'. Marked Bug as done Marked as fixed in versions openssl/3.0.5-1. Marked as found in versions openssl/3.0.3-8. Added tag(s) fixed-upstream and upstream. Merged 1012843 1013309 > affects 1013309 i2pd Bug #1013309 {Done: Sebastian Andrzej Siewior } [libssl3] vlc-cache-gen segfaults while dpkg is processing triggers for libvlc-bin Bug #1012843 {Done: Sebastian Andrzej Siewior } [libssl3] i2pd: Default install SEGV Added indication that 1013309 affects i2pd Added indication that 1012843 affects i2pd > thanks Stopping processing here. Please contact me if you need assistance. -- 1012843: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012843 1013309: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1013309 Debian Bug Tracking System Contact owner at bugs.debian.org with problems From sebastian at breakpoint.cc Wed Mar 18 20:24:04 2026 From: sebastian at breakpoint.cc (Sebastian Andrzej Siewior) Date: Wed, 18 Mar 2026 21:24:04 +0100 Subject: [Pkg-openssl-devel] Bug#1131121: openssl: qatengine breaks with openssl 3.6 In-Reply-To: <20260317203309.VXGUS-Kk@breakpoint.cc> References: <20260317203309.VXGUS-Kk@breakpoint.cc> <20260317203309.VXGUS-Kk@breakpoint.cc> Message-ID: <20260318202404.9k3AbY4b@breakpoint.cc> control: forwarded -1 https://github.com/intel/QAT_Engine/issues/353 control: severity -1 grave control: reassign -1 src:qatengine 2.0.0-8 control: tags -1 upstream forky sid control: affects -1 src:openssl control: retitle -1 qatengine: Uses openssl internal data structures, breaks with openssl-3.6 Hi, OpenSSL 3.6 changed an internal data structure (struct rsa_st, RSA) which is used by the qatengine provider if it provides fallback. This is what the selftest with "openssl speed rsa2048" is doing. Anyway, the layout changed in OpensSSL 3.6 and now the provider segfaults. Therefore I'm upgrading this bug to severity grave and assigning it to qatengine. I don't know if the rsa part is the only one affected or also other parts/ implementation use data structures which have changed. A quick fix and dirty fix would be to update QAT_RSA to what rsa_st has now in openssl-3.6 but this will only hold things together until openssl changes it again. Sebastian From owner at bugs.debian.org Wed Mar 18 20:27:08 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Wed, 18 Mar 2026 20:27:08 +0000 Subject: [Pkg-openssl-devel] Processed: Re: Bug#1131121: openssl: qatengine breaks with openssl 3.6 References: <20260318202404.9k3AbY4b@breakpoint.cc> <20260317203309.VXGUS-Kk@breakpoint.cc> Message-ID: Processing control commands: > forwarded -1 https://github.com/intel/QAT_Engine/issues/353 Bug #1131121 [src:openssl] openssl: qatengine breaks with openssl 3.6 Changed Bug forwarded-to-address to 'https://github.com/intel/QAT_Engine/issues/353' from 'https://github.com/openssl/openssl/issues/30473'. > severity -1 grave Bug #1131121 [src:openssl] openssl: qatengine breaks with openssl 3.6 Severity set to 'grave' from 'important' > reassign -1 src:qatengine 2.0.0-8 Bug #1131121 [src:openssl] openssl: qatengine breaks with openssl 3.6 Bug reassigned from package 'src:openssl' to 'src:qatengine'. No longer marked as found in versions openssl/3.6.0-1. Ignoring request to alter fixed versions of bug #1131121 to the same values previously set Bug #1131121 [src:qatengine] openssl: qatengine breaks with openssl 3.6 Marked as found in versions qatengine/2.0.0-8. > tags -1 upstream forky sid Bug #1131121 [src:qatengine] openssl: qatengine breaks with openssl 3.6 Added tag(s) sid, upstream, and forky. > affects -1 src:openssl Bug #1131121 [src:qatengine] openssl: qatengine breaks with openssl 3.6 Added indication that 1131121 affects src:openssl > retitle -1 qatengine: Uses openssl internal data structures, breaks with openssl-3.6 Bug #1131121 [src:qatengine] openssl: qatengine breaks with openssl 3.6 Changed Bug title to 'qatengine: Uses openssl internal data structures, breaks with openssl-3.6' from 'openssl: qatengine breaks with openssl 3.6'. -- 1131121: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131121 Debian Bug Tracking System Contact owner at bugs.debian.org with problems From ftpmaster at ftp-master.debian.org Wed Mar 18 22:17:46 2026 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Wed, 18 Mar 2026 22:17:46 +0000 Subject: [Pkg-openssl-devel] Processing of openssl_3.6.1-3_source.changes Message-ID: openssl_3.6.1-3_source.changes uploaded successfully to localhost along with the files: openssl_3.6.1-3.dsc openssl_3.6.1-3.debian.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org) From ftpmaster at ftp-master.debian.org Wed Mar 18 22:20:45 2026 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Wed, 18 Mar 2026 22:20:45 +0000 Subject: [Pkg-openssl-devel] openssl_3.6.1-3_source.changes ACCEPTED into unstable Message-ID: Thank you for your contribution to Debian. Accepted: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Wed, 18 Mar 2026 22:33:48 +0100 Source: openssl Architecture: source Version: 3.6.1-3 Distribution: unstable Urgency: medium Maintainer: Debian OpenSSL Team Changed-By: Sebastian Andrzej Siewior Closes: 1126531 1131164 Changes: openssl (3.6.1-3) unstable; urgency=medium . * Add breaks on openssl-provider-qat due to #1131121. * Apply fix for FTBFS on ppc64, thanks to John Paul Adrian Glaubitz (Closes: #1126531). * Add musl targets (Closes: #1131164). Checksums-Sha1: beff9094a306fce5f5eeda19b66ce6a504461d7c 2675 openssl_3.6.1-3.dsc 5309f6bcfa236a5da58fad27484a08e5455cd471 48768 openssl_3.6.1-3.debian.tar.xz Checksums-Sha256: f88d121dc304bd83f4193a2295064aeccecef0a4ed156ccd9725faaada912259 2675 openssl_3.6.1-3.dsc de70378498d2d652e9c5b8bbc65e9471e4845980ecc249f8205cf1a1f47871db 48768 openssl_3.6.1-3.debian.tar.xz Files: be81699aa976aff35ec5811dfa301636 2675 utils optional openssl_3.6.1-3.dsc a5678c65717354a2e9c9a17e9de78a4f 48768 utils optional openssl_3.6.1-3.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQGzBAEBCgAdFiEEV4kucFIzBRM39v3RBWQfF1cS+lsFAmm7I/gACgkQBWQfF1cS +lvs7Qv/YiBGcuBeNFFAXlZ9hCr6xO/MqhKQ04mWl/5U3Sp2X4Ox3BXE+Zxy6To1 2BghmpV12TSZkIevnp9RceEBj/nEVFEFzf9bzDexz8S0D6sTkN61jaVWBqiare1w KPEPuVqQhj+t+H/l5Sb9+p6rUOv6CqrGqTZYul8DPe6i6OPbEEKvxubobId71OIH VC83H4CAUif9EnHdJU+Pckd1CoT/A2x0PT5LXR8sJ0D9YiEuKXBCqrubPvz48qZn mG9c7JbB3L9ll7OHqNfFUA+nivWGVcbNKitco5qHQE2lpoCRq9MaZvZEcYNYlne1 /pDoUXcoynOGTNtNlXNVkx+KlVs+IPLao1IfUEuvE8bE2ASQPt6s2Ni7xDJVmO/b 7mjerGNlzvF+HK8j6bTNnDR8Av8u4i7pr2QDrX03Yl41Ou9IlQgFv0ikAop2PyJL yGzhzHVl1G3z4xEQgB2FE1Fr93+jn0KkAtHBuRDm1emgeTBaF4lCCiXuORqo9xOL f+rBwxsb =c6fY -----END PGP SIGNATURE----- -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 228 bytes Desc: not available URL: From owner at bugs.debian.org Wed Mar 18 22:23:02 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Wed, 18 Mar 2026 22:23:02 +0000 Subject: [Pkg-openssl-devel] Bug#1126531: marked as done (openssl: FTBFS on ppc64 while trying to link ELFv1 with ELFv2 code) References: <176958480419.3617879.7003156543140456923.reportbug@login1.physik.fu-berlin.de> Message-ID: Your message dated Wed, 18 Mar 2026 22:20:45 +0000 with message-id and subject line Bug#1126531: fixed in openssl 3.6.1-3 has caused the Debian Bug report #1126531, regarding openssl: FTBFS on ppc64 while trying to link ELFv1 with ELFv2 code to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 1126531: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126531 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: John Paul Adrian Glaubitz Subject: openssl: FTBFS on ppc64 while trying to link ELFv1 with ELFv2 code Date: Wed, 28 Jan 2026 08:20:04 +0100 Size: 5372 URL: -------------- next part -------------- An embedded message was scrubbed... From: Debian FTP Masters Subject: Bug#1126531: fixed in openssl 3.6.1-3 Date: Wed, 18 Mar 2026 22:20:45 +0000 Size: 6312 URL: From owner at bugs.debian.org Wed Mar 18 22:23:03 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Wed, 18 Mar 2026 22:23:03 +0000 Subject: [Pkg-openssl-devel] Bug#1131164: marked as done (openssl: add more musl targets) References: <20260312181352.GA70364@subdivi.de> Message-ID: Your message dated Wed, 18 Mar 2026 22:20:45 +0000 with message-id and subject line Bug#1131164: fixed in openssl 3.6.1-3 has caused the Debian Bug report #1131164, regarding openssl: add more musl targets to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 1131164: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131164 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Helmut Grohne Subject: openssl: add more musl targets Date: Thu, 12 Mar 2026 19:13:52 +0100 Size: 3817 URL: -------------- next part -------------- An embedded message was scrubbed... From: Debian FTP Masters Subject: Bug#1131164: fixed in openssl 3.6.1-3 Date: Wed, 18 Mar 2026 22:20:45 +0000 Size: 6260 URL: From desk at conexaomovel.com Fri Mar 20 21:58:21 2026 From: desk at conexaomovel.com (Sudhakar Krishnamuthy - Integrated Smart Engineers LLP) Date: Fri, 20 Mar 2026 21:58:21 +0000 Subject: [Pkg-openssl-devel] Value engineering for facades Message-ID: <177404390109.340580.16385603452434208138@conexaomovel.com> To WNPP DEBIAN I know keeping facades both striking and structurally sound under tight budgets is a constant squeeze. Reduce facade risk from day one with rigorous engineering that anticipates structural, thermal, and weather challenges before they become change orders. Developers, architects, and contractors rely on ISE for value-engineered facade solutions that balance aesthetics, performance, and constructability. Can we set up a quick review of one current project to identify facade or structural optimization opportunities? Warm regards Sudhakar Krishnamuthy Integrated Smart Engineers LLP You can unsubscribe anytime by replying "Remove" -------------- next part -------------- An HTML attachment was scrubbed... URL: From owner at bugs.debian.org Sat Mar 21 13:39:01 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sat, 21 Mar 2026 13:39:01 +0000 Subject: [Pkg-openssl-devel] Bug#681612: marked as done (libssl1.0.0: fishy reliance on errno when errno is not set) References: <20260321133609.sYfQ1WeV@breakpoint.cc> <20120714183008.4181.29861.reportbug@cerebro.laendle> Message-ID: Your message dated Sat, 21 Mar 2026 14:36:09 +0100 with message-id <20260321133609.sYfQ1WeV at breakpoint.cc> and subject line Re: Bug#681612: libssl1.0.0: fishy reliance on errno when errno is not set has caused the Debian Bug report #681612, regarding libssl1.0.0: fishy reliance on errno when errno is not set to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 681612: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681612 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Marc Lehmann Subject: libssl1.0.0: fishy reliance on errno when errno is not set Date: Sat, 14 Jul 2012 20:30:08 +0200 Size: 5657 URL: -------------- next part -------------- An embedded message was scrubbed... From: Sebastian Andrzej Siewior Subject: Re: Bug#681612: libssl1.0.0: fishy reliance on errno when errno is not set Date: Sat, 21 Mar 2026 14:36:09 +0100 Size: 4118 URL: From owner at bugs.debian.org Sat Mar 21 13:45:02 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sat, 21 Mar 2026 13:45:02 +0000 Subject: [Pkg-openssl-devel] Bug#698219: marked as done ([dget] error:14077458:SSL routines:SSL23_GET_SERVER_HELLO:reason(1112)) References: <20260321134300.VA2mLt1e@breakpoint.cc> <20130115124434.1970.63702.reportbug@lirispat.univ-lyon1.fr> Message-ID: Your message dated Sat, 21 Mar 2026 14:43:00 +0100 with message-id <20260321134300.VA2mLt1e at breakpoint.cc> and subject line Re: Bug#698219: dget: error:14077458:SSL routines:SSL23_GET_SERVER_HELLO:reason(1112) has caused the Debian Bug report #698219, regarding [dget] error:14077458:SSL routines:SSL23_GET_SERVER_HELLO:reason(1112) to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 698219: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698219 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Mathieu Malaterre Subject: dget: error:14077458:SSL routines:SSL23_GET_SERVER_HELLO:reason(1112) Date: Tue, 15 Jan 2013 13:44:34 +0100 Size: 7169 URL: -------------- next part -------------- An embedded message was scrubbed... From: Sebastian Andrzej Siewior Subject: Re: Bug#698219: dget: error:14077458:SSL routines:SSL23_GET_SERVER_HELLO:reason(1112) Date: Sat, 21 Mar 2026 14:43:00 +0100 Size: 5683 URL: From owner at bugs.debian.org Sat Mar 21 13:49:02 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sat, 21 Mar 2026 13:49:02 +0000 Subject: [Pkg-openssl-devel] Bug#742240: marked as done (libssl1.0.0: TLSv1_client_method()/SSL_Connect() heap overrun) References: <20260321134611.XlyMJ7_7@breakpoint.cc> <20140321060411.24666.39288.reportbug@flux> Message-ID: Your message dated Sat, 21 Mar 2026 14:46:11 +0100 with message-id <20260321134611.XlyMJ7_7 at breakpoint.cc> and subject line Re: Bug#742240: libssl1.0.0: TLSv1_client_method()/SSL_Connect() heap overrun has caused the Debian Bug report #742240, regarding libssl1.0.0: TLSv1_client_method()/SSL_Connect() heap overrun to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 742240: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742240 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Brandon Subject: libssl1.0.0: TLSv1_client_method()/SSL_Connect() heap overrun Date: Fri, 21 Mar 2014 02:04:11 -0400 Size: 3621 URL: -------------- next part -------------- An embedded message was scrubbed... From: Sebastian Andrzej Siewior Subject: Re: Bug#742240: libssl1.0.0: TLSv1_client_method()/SSL_Connect() heap overrun Date: Sat, 21 Mar 2026 14:46:11 +0100 Size: 3250 URL: From owner at bugs.debian.org Sat Mar 21 13:51:00 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sat, 21 Mar 2026 13:51:00 +0000 Subject: [Pkg-openssl-devel] Bug#747469: marked as done (openssl s_client -starttls hangs on XMPP s2s connections) References: <20260321134858.Q7OtjTVT@breakpoint.cc> <20140509060542.22520.28954.reportbug@box1.sys.ccs-baumann.de> Message-ID: Your message dated Sat, 21 Mar 2026 14:48:58 +0100 with message-id <20260321134858.Q7OtjTVT at breakpoint.cc> and subject line Re: Bug#747469: openssl s_client -starttls hangs on XMPP s2s connections has caused the Debian Bug report #747469, regarding openssl s_client -starttls hangs on XMPP s2s connections to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 747469: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=747469 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Benny Baumann Subject: openssl s_client -starttls hangs on XMPP s2s connections Date: Fri, 09 May 2014 08:05:42 +0200 Size: 3584 URL: -------------- next part -------------- An embedded message was scrubbed... From: Sebastian Andrzej Siewior Subject: Re: Bug#747469: openssl s_client -starttls hangs on XMPP s2s connections Date: Sat, 21 Mar 2026 14:48:58 +0100 Size: 3126 URL: From owner at bugs.debian.org Sat Mar 21 14:49:02 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sat, 21 Mar 2026 14:49:02 +0000 Subject: [Pkg-openssl-devel] Processed: your mail References: <20260321144559.VWui-Y3g@breakpoint.cc> Message-ID: Processing commands for control at bugs.debian.org: > forwarded 747470 https://github.com/openssl/openssl/pull/30519 Bug #747470 [src:openssl] openssl s_client refuses to be silent Set Bug forwarded-to-address to 'https://github.com/openssl/openssl/pull/30519'. > End of message, stopping processing here. Please contact me if you need assistance. -- 747470: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=747470 Debian Bug Tracking System Contact owner at bugs.debian.org with problems From owner at bugs.debian.org Sat Mar 21 14:53:02 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sat, 21 Mar 2026 14:53:02 +0000 Subject: [Pkg-openssl-devel] Bug#749473: marked as done (libssl1.0.0: postinst recommends using /etc/init.d/ instead of service or invoke-rc.d) References: <20260321145033.aR2kHZUt@breakpoint.cc> <1401178827.22946.15.camel@chianamo> Message-ID: Your message dated Sat, 21 Mar 2026 15:50:33 +0100 with message-id <20260321145033.aR2kHZUt at breakpoint.cc> and subject line Re: Bug#749473: libssl1.0.0: postinst recommends using /etc/init.d/ instead of service or invoke-rc.d has caused the Debian Bug report #749473, regarding libssl1.0.0: postinst recommends using /etc/init.d/ instead of service or invoke-rc.d to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 749473: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=749473 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Paul Wise Subject: libssl1.0.0: postinst recommends using /etc/init.d/ instead of service or invoke-rc.d Date: Tue, 27 May 2014 16:20:27 +0800 Size: 4057 URL: -------------- next part -------------- An embedded message was scrubbed... From: Sebastian Andrzej Siewior Subject: Re: Bug#749473: libssl1.0.0: postinst recommends using /etc/init.d/ instead of service or invoke-rc.d Date: Sat, 21 Mar 2026 15:50:33 +0100 Size: 3295 URL: From owner at bugs.debian.org Sat Mar 21 14:55:02 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sat, 21 Mar 2026 14:55:02 +0000 Subject: [Pkg-openssl-devel] Bug#757446: marked as done (libssl1.0.0: services are not restarted when upgrading) References: <20260321145236.Cl1PCXhp@breakpoint.cc> <20140808093719.22140.18811.reportbug@moebius.durcheinandertal.local> Message-ID: Your message dated Sat, 21 Mar 2026 15:52:36 +0100 with message-id <20260321145236.Cl1PCXhp at breakpoint.cc> and subject line Re: Bug#757446: libssl1.0.0: services are not restarted when upgrading has caused the Debian Bug report #757446, regarding libssl1.0.0: services are not restarted when upgrading to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 757446: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757446 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Gaudenz Steinlin Subject: libssl1.0.0: services are not restarted when upgrading Date: Fri, 08 Aug 2014 11:37:19 +0200 Size: 2513 URL: -------------- next part -------------- An embedded message was scrubbed... From: Sebastian Andrzej Siewior Subject: Re: Bug#757446: libssl1.0.0: services are not restarted when upgrading Date: Sat, 21 Mar 2026 15:52:36 +0100 Size: 3182 URL: From owner at bugs.debian.org Sat Mar 21 14:57:02 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sat, 21 Mar 2026 14:57:02 +0000 Subject: [Pkg-openssl-devel] Bug#793565: marked as done (libssl1.0.0: HMAC broken after upgrade to 1.0.2d-1) References: <20260321145617.zHFvgSQ7@breakpoint.cc> <20150725064539.GA4485@schmorp.de> Message-ID: Your message dated Sat, 21 Mar 2026 15:56:17 +0100 with message-id <20260321145617.zHFvgSQ7 at breakpoint.cc> and subject line Re: Bug#793565: libssl1.0.0: HMAC broken after upgrade to 1.0.2d-1 has caused the Debian Bug report #793565, regarding libssl1.0.0: HMAC broken after upgrade to 1.0.2d-1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 793565: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=793565 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Marc Lehmann Subject: libssl1.0.0: HMAC broken after upgrade to 1.0.2d-1 Date: Sat, 25 Jul 2015 08:45:39 +0200 Size: 3427 URL: -------------- next part -------------- An embedded message was scrubbed... From: Sebastian Andrzej Siewior Subject: Re: Bug#793565: libssl1.0.0: HMAC broken after upgrade to 1.0.2d-1 Date: Sat, 21 Mar 2026 15:56:17 +0100 Size: 3405 URL: From owner at bugs.debian.org Sat Mar 21 15:23:02 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sat, 21 Mar 2026 15:23:02 +0000 Subject: [Pkg-openssl-devel] Bug#930792: marked as done (openssl: libssl1.1 does not restart services on upgrade) References: <20260321151958.m6xC1i8g@breakpoint.cc> <156105284289.3141.7085921766927187363.reportbug@ottawa.168.1.5> Message-ID: Your message dated Sat, 21 Mar 2026 16:19:58 +0100 with message-id <20260321151958.m6xC1i8g at breakpoint.cc> and subject line Re: Bug#930792: openssl: libssl1.1 does not restart services on upgrade has caused the Debian Bug report #930792, regarding openssl: libssl1.1 does not restart services on upgrade to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 930792: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930792 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Dimitri John Ledkov Subject: openssl: libssl1.1 does not restart services on upgrade Date: Thu, 20 Jun 2019 18:47:22 +0100 Size: 3699 URL: -------------- next part -------------- An embedded message was scrubbed... From: Sebastian Andrzej Siewior Subject: Re: Bug#930792: openssl: libssl1.1 does not restart services on upgrade Date: Sat, 21 Mar 2026 16:19:58 +0100 Size: 3072 URL: From owner at bugs.debian.org Sat Mar 21 15:23:03 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sat, 21 Mar 2026 15:23:03 +0000 Subject: [Pkg-openssl-devel] Bug#930793: marked as done (openssl: libssl1.1 uses unguarded debconf prompt for a question it does not ship) References: <20260321152157.lWOKXUQS@breakpoint.cc> <156105302590.3306.15376984582077942870.reportbug@ottawa.168.1.5> Message-ID: Your message dated Sat, 21 Mar 2026 16:21:57 +0100 with message-id <20260321152157.lWOKXUQS at breakpoint.cc> and subject line Re: Bug#930793: openssl: libssl1.1 uses unguarded debconf prompt for a question it does not ship has caused the Debian Bug report #930793, regarding openssl: libssl1.1 uses unguarded debconf prompt for a question it does not ship to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 930793: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930793 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Dimitri John Ledkov Subject: openssl: libssl1.1 uses unguarded debconf prompt for a question it does not ship Date: Thu, 20 Jun 2019 18:50:25 +0100 Size: 3981 URL: -------------- next part -------------- An embedded message was scrubbed... From: Sebastian Andrzej Siewior Subject: Re: Bug#930793: openssl: libssl1.1 uses unguarded debconf prompt for a question it does not ship Date: Sat, 21 Mar 2026 16:21:57 +0100 Size: 3016 URL: From sebastian at breakpoint.cc Sat Mar 21 15:23:57 2026 From: sebastian at breakpoint.cc (Sebastian Andrzej Siewior) Date: Sat, 21 Mar 2026 16:23:57 +0100 Subject: [Pkg-openssl-devel] Bug#934921: openssl: Wrong regular expression in /usr/bin/c_rehash References: Message-ID: <20260321152357.33QIR6EY@breakpoint.cc> The perl c_rehash script is no longer shipped. Sebastian From owner at bugs.debian.org Sat Mar 21 15:25:02 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sat, 21 Mar 2026 15:25:02 +0000 Subject: [Pkg-openssl-devel] Bug#934921: marked as done (openssl: Wrong regular expression in /usr/bin/c_rehash) References: <20260321152416.qNhHH4B7@breakpoint.cc> Message-ID: Your message dated Sat, 21 Mar 2026 16:24:16 +0100 with message-id <20260321152416.qNhHH4B7 at breakpoint.cc> and subject line Re: openssl: Wrong regular expression in /usr/bin/c_rehash has caused the Debian Bug report #934921, regarding openssl: Wrong regular expression in /usr/bin/c_rehash to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 934921: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934921 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Andreas Gryphius Subject: openssl: Wrong regular expression in /usr/bin/c_rehash Date: Fri, 16 Aug 2019 18:22:00 +0200 Size: 3879 URL: -------------- next part -------------- An embedded message was scrubbed... From: Sebastian Andrzej Siewior Subject: Re: openssl: Wrong regular expression in /usr/bin/c_rehash Date: Sat, 21 Mar 2026 16:24:16 +0100 Size: 2713 URL: From owner at bugs.debian.org Sat Mar 21 15:37:01 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sat, 21 Mar 2026 15:37:01 +0000 Subject: [Pkg-openssl-devel] Bug#520021: marked as done (libpam0g.postinst uses /bin/bash instead of /bin/sh) References: <20260321153545.UqJRJ8nq@breakpoint.cc> <20090316144823.14070.17995.reportbug@localhost> Message-ID: Your message dated Sat, 21 Mar 2026 16:35:45 +0100 with message-id <20260321153545.UqJRJ8nq at breakpoint.cc> and subject line Re: Bug#519973: libpam0g.postinst uses /bin/bash instead of /bin/sh has caused the Debian Bug report #520021, regarding libpam0g.postinst uses /bin/bash instead of /bin/sh to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 520021: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=520021 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Stefan Monnier Subject: libpam0g.postinst uses /bin/bash instead of /bin/sh Date: Mon, 16 Mar 2009 10:48:23 -0400 Size: 3099 URL: -------------- next part -------------- An embedded message was scrubbed... From: Sebastian Andrzej Siewior Subject: Re: Bug#519973: libpam0g.postinst uses /bin/bash instead of /bin/sh Date: Sat, 21 Mar 2026 16:35:45 +0100 Size: 3040 URL: From owner at bugs.debian.org Sat Mar 21 15:41:01 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sat, 21 Mar 2026 15:41:01 +0000 Subject: [Pkg-openssl-devel] Bug#1127439: marked as done (openssl: MD5_Final performing out-of-bounds-write) References: <20260321153930.8CAf4fpG@breakpoint.cc> <177057506862.19210.15979584634345579015.reportbug@3af1fdbcfab0> Message-ID: Your message dated Sat, 21 Mar 2026 16:39:30 +0100 with message-id <20260321153930.8CAf4fpG at breakpoint.cc> and subject line Re: [Pkg-openssl-devel] Bug#1127439: Bug#1127439: Resolved has caused the Debian Bug report #1127439, regarding openssl: MD5_Final performing out-of-bounds-write to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 1127439: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127439 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Max Burke Subject: openssl: MD5_Final performing out-of-bounds-write Date: Sun, 08 Feb 2026 18:24:28 +0000 Size: 4579 URL: -------------- next part -------------- An embedded message was scrubbed... From: Sebastian Andrzej Siewior Subject: Re: [Pkg-openssl-devel] Bug#1127439: Bug#1127439: Resolved Date: Sat, 21 Mar 2026 16:39:30 +0100 Size: 3252 URL: From owner at bugs.debian.org Sat Mar 21 15:43:03 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sat, 21 Mar 2026 15:43:03 +0000 Subject: [Pkg-openssl-devel] Bug#791898: marked as done (openssl: sendmail fails to send mails to some mail servers. Deferred: 403 4.7.0 TLS handshake failed.) References: <20260321154211.6EqgKsth@breakpoint.cc> <20150709103158.8755.62219.reportbug@laurel.arri.de> Message-ID: Your message dated Sat, 21 Mar 2026 16:42:11 +0100 with message-id <20260321154211.6EqgKsth at breakpoint.cc> and subject line Re: Bug#791898: openssl: sendmail fails to send mails to some mail servers. Deferred: 403 4.7.0 TLS handshake failed. has caused the Debian Bug report #791898, regarding openssl: sendmail fails to send mails to some mail servers. Deferred: 403 4.7.0 TLS handshake failed. to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 791898: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=791898 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: F Schafhauser Subject: openssl: sendmail fails to send mails to some mail servers. Deferred: 403 4.7.0 TLS handshake failed. Date: Thu, 09 Jul 2015 12:31:58 +0200 Size: 5412 URL: -------------- next part -------------- An embedded message was scrubbed... From: Sebastian Andrzej Siewior Subject: Re: Bug#791898: openssl: sendmail fails to send mails to some mail servers. Deferred: 403 4.7.0 TLS handshake failed. Date: Sat, 21 Mar 2026 16:42:11 +0100 Size: 3089 URL: From owner at bugs.debian.org Sat Mar 21 15:51:03 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sat, 21 Mar 2026 15:51:03 +0000 Subject: [Pkg-openssl-devel] Bug#656381: marked as done (libssl-doc: Redundant 'documentation' in the synopsis) References: <20260321154900.qddENW-a@breakpoint.cc> <20120118225547.8123.81934.reportbug@blackhost> Message-ID: Your message dated Sat, 21 Mar 2026 16:49:00 +0100 with message-id <20260321154900.qddENW-a at breakpoint.cc> and subject line Re: Bug#656381: libssl-doc: Redundant 'documentation' in the synopsis has caused the Debian Bug report #656381, regarding libssl-doc: Redundant 'documentation' in the synopsis to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 656381: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=656381 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Vincent Blut Subject: libssl-doc: Redundant 'documentation' in the synopsis Date: Wed, 18 Jan 2012 22:55:47 +0000 Size: 2274 URL: -------------- next part -------------- An embedded message was scrubbed... From: Sebastian Andrzej Siewior Subject: Re: Bug#656381: libssl-doc: Redundant 'documentation' in the synopsis Date: Sat, 21 Mar 2026 16:49:00 +0100 Size: 2952 URL: From sebastian at breakpoint.cc Sat Mar 21 20:46:54 2026 From: sebastian at breakpoint.cc (Sebastian Andrzej Siewior) Date: Sat, 21 Mar 2026 21:46:54 +0100 Subject: [Pkg-openssl-devel] Bug#766463: ocsp: glibc free(): invalid pointer In-Reply-To: <5448D371.1070808@fotolia.com> References: <5448D371.1070808@fotolia.com> <5448D371.1070808@fotolia.com> Message-ID: <20260321204654.F964Ga7V@breakpoint.cc> On 2014-10-23 12:07:45 [+0200], Herv? COMMOWICK wrote: > Hello, Hi, > i can't use ocsp function, openssl write a file, but a corrupted one : > > # openssl ocsp -noverify -no_nonce -issuer /tmp/tmp.PJJEhCPIFj/issuer.pem > -cert /tmp/tmp.PJJEhCPIFj/main_cert.pem -url http://httpproxy:3128 -path > http://ocsp.geotrust.com -respout wildcard_com.pem.ocsp > /tmp/tmp.PJJEhCPIFj/main_cert.pem: good > This Update: Oct 22 09:03:26 2014 GMT > Next Update: Oct 29 09:03:26 2014 GMT > *** glibc detected *** openssl: free(): invalid pointer: 0x00007fff947e0949 Is this glibc error still happening? Sebastian From owner at bugs.debian.org Sat Mar 21 20:59:02 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sat, 21 Mar 2026 20:59:02 +0000 Subject: [Pkg-openssl-devel] Bug#315522: marked as done (openssl: should include -timeout option) References: <20260321205636.yBSARfO-@breakpoint.cc> Message-ID: Your message dated Sat, 21 Mar 2026 21:56:36 +0100 with message-id <20260321205636.yBSARfO- at breakpoint.cc> and subject line Re: Bug#315522: openssl: should include -timeout option has caused the Debian Bug report #315522, regarding openssl: should include -timeout option to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 315522: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=315522 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Ville Nummela Subject: openssl: should include -timeout option Date: Thu, 23 Jun 2005 11:30:28 +0300 Size: 1979 URL: -------------- next part -------------- An embedded message was scrubbed... From: Sebastian Andrzej Siewior Subject: Re: Bug#315522: openssl: should include -timeout option Date: Sat, 21 Mar 2026 21:56:36 +0100 Size: 3243 URL: From owner at bugs.debian.org Sun Mar 22 08:11:06 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sun, 22 Mar 2026 08:11:06 +0000 Subject: [Pkg-openssl-devel] Bug#766463: marked as done (ocsp: glibc free(): invalid pointer) References: <20260322081007.L-p0Xj1b@breakpoint.cc> <5448D371.1070808@fotolia.com> Message-ID: Your message dated Sun, 22 Mar 2026 09:10:07 +0100 with message-id <20260322081007.L-p0Xj1b at breakpoint.cc> and subject line Re: [Pkg-openssl-devel] Bug#766463: ocsp: glibc free(): invalid pointer has caused the Debian Bug report #766463, regarding ocsp: glibc free(): invalid pointer to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 766463: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766463 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: =?ISO-8859-15?Q?Herv=E9_COMMOWICK?= Subject: ocsp: glibc free(): invalid pointer Date: Thu, 23 Oct 2014 12:07:45 +0200 Size: 8365 URL: -------------- next part -------------- An embedded message was scrubbed... From: Sebastian Andrzej Siewior Subject: Re: [Pkg-openssl-devel] Bug#766463: ocsp: glibc free(): invalid pointer Date: Sun, 22 Mar 2026 09:10:07 +0100 Size: 3813 URL: From sebastian at breakpoint.cc Sun Mar 22 08:18:10 2026 From: sebastian at breakpoint.cc (Sebastian Andrzej Siewior) Date: Sun, 22 Mar 2026 09:18:10 +0100 Subject: [Pkg-openssl-devel] Bug#808721: libc: avoid negative questions in restart-without-asking debconf knob In-Reply-To: <20151225222942.GA28865@aurel32.net> References: <145077023752.825.1753114245626881853.reportbug@sidney.v.shahaf.local2> <20151225222942.GA28865@aurel32.net> Message-ID: <20260322081810.rhMACXX8@breakpoint.cc> control: reassign -1 libc6,pam On 2015-12-25 23:29:42 [+0100], Aurelien Jarno wrote: > control: reassign -1 libc6,pam,openssl > control: retitle -1 libc6,pam,openssl: avoid negative questions in restart-without-asking debconf knob I don't know what the status of this and who is in charge (or should do the change (that sounds good later in the thread)). I am moving openssl out of the picture because the postinst part that was (probably) using this is gone. Sebastian From owner at bugs.debian.org Sun Mar 22 08:21:01 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sun, 22 Mar 2026 08:21:01 +0000 Subject: [Pkg-openssl-devel] Processed: Re: Bug#808721: libc: avoid negative questions in restart-without-asking debconf knob References: <20260322081810.rhMACXX8@breakpoint.cc> <145077023752.825.1753114245626881853.reportbug@sidney.v.shahaf.local2> Message-ID: Processing control commands: > reassign -1 libc6,pam Bug #808721 [libc6,pam,openssl] libc6,pam,openssl: avoid negative questions in restart-without-asking debconf knob Bug reassigned from package 'libc6,pam,openssl' to 'libc6,pam'. Ignoring request to alter found versions of bug #808721 to the same values previously set Ignoring request to alter fixed versions of bug #808721 to the same values previously set -- 808721: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808721 Debian Bug Tracking System Contact owner at bugs.debian.org with problems From sebastian at breakpoint.cc Sun Mar 22 08:18:10 2026 From: sebastian at breakpoint.cc (Sebastian Andrzej Siewior) Date: Sun, 22 Mar 2026 09:18:10 +0100 Subject: [Pkg-openssl-devel] Bug#808721: libc: avoid negative questions in restart-without-asking debconf knob In-Reply-To: <20151225222942.GA28865@aurel32.net> References: <145077023752.825.1753114245626881853.reportbug@sidney.v.shahaf.local2> <20151225222942.GA28865@aurel32.net> <145077023752.825.1753114245626881853.reportbug@sidney.v.shahaf.local2> Message-ID: <20260322081810.rhMACXX8@breakpoint.cc> control: reassign -1 libc6,pam On 2015-12-25 23:29:42 [+0100], Aurelien Jarno wrote: > control: reassign -1 libc6,pam,openssl > control: retitle -1 libc6,pam,openssl: avoid negative questions in restart-without-asking debconf knob I don't know what the status of this and who is in charge (or should do the change (that sounds good later in the thread)). I am moving openssl out of the picture because the postinst part that was (probably) using this is gone. Sebastian From owner at bugs.debian.org Sun Mar 22 08:21:03 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sun, 22 Mar 2026 08:21:03 +0000 Subject: [Pkg-openssl-devel] Bug#861285: marked as done (openssl enc -k path-for-keyphrase-file ...c does not fail if the keyphrase-file is missing.) References: <20260322082017._QjVWEAt@breakpoint.cc> <48557c6b-4894-8ace-8d8f-9a30cf3d125a@yk.rim.or.jp> Message-ID: Your message dated Sun, 22 Mar 2026 09:20:17 +0100 with message-id <20260322082017._QjVWEAt at breakpoint.cc> and subject line Re: Bug#861285: [Pkg-openssl-devel] Bug#861285: openssl enc -k path-for-keyphrase-file ...c does not fail if the keyphrase-file is missing. has caused the Debian Bug report #861285, regarding openssl enc -k path-for-keyphrase-file ...c does not fail if the keyphrase-file is missing. to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 861285: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861285 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: "ISHIKAWA,chiaki" Subject: openssl enc -k path-for-keyphrase-file ...c does not fail if the keyphrase-file is missing. Date: Thu, 27 Apr 2017 08:46:10 +0900 Size: 4037 URL: -------------- next part -------------- An embedded message was scrubbed... From: Sebastian Andrzej Siewior Subject: Re: Bug#861285: [Pkg-openssl-devel] Bug#861285: openssl enc -k path-for-keyphrase-file ...c does not fail if the keyphrase-file is missing. Date: Sun, 22 Mar 2026 09:20:17 +0100 Size: 3872 URL: From owner at bugs.debian.org Sun Mar 22 08:41:01 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sun, 22 Mar 2026 08:41:01 +0000 Subject: [Pkg-openssl-devel] Bug#672456: marked as done (CVE-2011-1473: SSL/TLS DoS via repeated SSL session renegotiations) References: <20260322083851.bEFhEkPx@breakpoint.cc> <20120511081811.GA7876@kludge.henri.nerv.fi> Message-ID: Your message dated Sun, 22 Mar 2026 09:38:51 +0100 with message-id <20260322083851.bEFhEkPx at breakpoint.cc> and subject line Re: Bug#672456: CVE-2011-1473: SSL/TLS DoS via repeated SSL session renegotiations has caused the Debian Bug report #672456, regarding CVE-2011-1473: SSL/TLS DoS via repeated SSL session renegotiations to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 672456: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672456 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Henri Salo Subject: CVE-2011-1473: SSL/TLS DoS via repeated SSL session renegotiations Date: Fri, 11 May 2012 11:18:11 +0300 Size: 4060 URL: -------------- next part -------------- An embedded message was scrubbed... From: Sebastian Andrzej Siewior Subject: Re: Bug#672456: CVE-2011-1473: SSL/TLS DoS via repeated SSL session renegotiations Date: Sun, 22 Mar 2026 09:38:51 +0100 Size: 3907 URL: From owner at bugs.debian.org Sun Mar 22 09:13:01 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sun, 22 Mar 2026 09:13:01 +0000 Subject: [Pkg-openssl-devel] Bug#588267: marked as done (openssl randomly get into endless loop when using pipe output and limited read in sub process) References: <20260322091106.UPrkM5_S@breakpoint.cc> <20100706163724.24890.98305.reportbug@tachikoma.strasbourg.4js.com> Message-ID: Your message dated Sun, 22 Mar 2026 10:11:06 +0100 with message-id <20260322091106.UPrkM5_S at breakpoint.cc> and subject line Re: Bug#588267: openssl randomly get into endless loop when using pipe output and limited read in sub process has caused the Debian Bug report #588267, regarding openssl randomly get into endless loop when using pipe output and limited read in sub process to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 588267: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=588267 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Gabriel CORRE Subject: openssl randomly get into endless loop when using pipe output and limited read in sub process Date: Tue, 06 Jul 2010 18:37:24 +0200 Size: 6956 URL: -------------- next part -------------- An embedded message was scrubbed... From: Sebastian Andrzej Siewior Subject: Re: Bug#588267: openssl randomly get into endless loop when using pipe output and limited read in sub process Date: Sun, 22 Mar 2026 10:11:06 +0100 Size: 3697 URL: From no_reply at email.apple.com Sun Mar 22 16:35:27 2026 From: no_reply at email.apple.com (TestFlight) Date: Sun, 22 Mar 2026 16:35:27 +0000 (GMT) Subject: [Pkg-openssl-devel] Samet SAP has invited you to test OpenAI AdsGPT AI Lab. Message-ID: <1298852182.386901336.1774197327949@email.apple.com> An HTML attachment was scrubbed... URL: From owner at bugs.debian.org Sun Mar 22 20:39:02 2026 From: owner at bugs.debian.org (Debian Bug Tracking System) Date: Sun, 22 Mar 2026 20:39:02 +0000 Subject: [Pkg-openssl-devel] Bug#781102: marked as done (typo in ciphers(1) man page) References: <20260322203706.MSeTe_bw@breakpoint.cc> <55117AD9.7030602@gedalya.net> Message-ID: Your message dated Sun, 22 Mar 2026 21:37:06 +0100 with message-id <20260322203706.MSeTe_bw at breakpoint.cc> and subject line Re: Bug#781102: typo in ciphers(1) man page has caused the Debian Bug report #781102, regarding typo in ciphers(1) man page to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 781102: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781102 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Gedalya Subject: typo in ciphers(1) man page Date: Tue, 24 Mar 2015 10:55:21 -0400 Size: 3068 URL: -------------- next part -------------- An embedded message was scrubbed... From: Sebastian Andrzej Siewior Subject: Re: Bug#781102: typo in ciphers(1) man page Date: Sun, 22 Mar 2026 21:37:06 +0100 Size: 2989 URL: From aurel32 at debian.org Sun Mar 22 22:47:56 2026 From: aurel32 at debian.org (Aurelien Jarno) Date: Sun, 22 Mar 2026 23:47:56 +0100 Subject: [Pkg-openssl-devel] Bug#808721: libc: avoid negative questions in restart-without-asking debconf knob In-Reply-To: <20260322081810.rhMACXX8@breakpoint.cc> References: <145077023752.825.1753114245626881853.reportbug@sidney.v.shahaf.local2> <20151225222942.GA28865@aurel32.net> <145077023752.825.1753114245626881853.reportbug@sidney.v.shahaf.local2> <20260322081810.rhMACXX8@breakpoint.cc> Message-ID: Hi, On 2026-03-22 09:18, Sebastian Andrzej Siewior wrote: > control: reassign -1 libc6,pam > > On 2015-12-25 23:29:42 [+0100], Aurelien Jarno wrote: > > control: reassign -1 libc6,pam,openssl > > control: retitle -1 libc6,pam,openssl: avoid negative questions in restart-without-asking debconf knob > > I don't know what the status of this and who is in charge (or should do > the change (that sounds good later in the thread)). The change has to be done on the glibc side, but has to be agreed and coordinated with the other packages using the template. Otherwise replacing the template by a positive one will just make the other packages failing to configure. Unfortunately I haven't received any feedback from pam, and, until today, from openssl. An alternative would be to do the change in glibc, while keeping the old template, but that would mean the users will get prompted twice, once negatively and once positively, and that glibc will still has to maintain the translation for a template it doesn't use. > I am moving openssl > out of the picture because the postinst part that was (probably) using > this is gone. Ok, thanks for the update. From a quick look, it seems to have happened between bullseye and bookworm. At least there is some progress. Regards Aurelien -- Aurelien Jarno GPG: 4096R/1DDD8C9B aurelien at aurel32.net http://aurel32.net From ananda at bkhospitalar.com.br Mon Mar 23 03:02:34 2026 From: ananda at bkhospitalar.com.br (Ananda Rosa) Date: Mon, 23 Mar 2026 03:02:34 -0000 Subject: [Pkg-openssl-devel] NFS-e 0748449 emitida Message-ID: An HTML attachment was scrubbed... URL: From noreply at release.debian.org Tue Mar 24 04:39:21 2026 From: noreply at release.debian.org (Debian testing watch) Date: Tue, 24 Mar 2026 04:39:21 +0000 Subject: [Pkg-openssl-devel] openssl 3.6.1-3 MIGRATED to testing Message-ID: FYI: The status of the openssl source package in Debian's testing distribution has changed. Previous version: 3.5.5-1 Current version: 3.6.1-3 -- This email is automatically generated once a day. As the installation of new packages into testing happens multiple times a day you will receive later changes on the next day. See https://release.debian.org/testing-watch/ for more information. From noreplyo0dt6snn at sandfordpartners.mom Tue Mar 24 11:30:49 2026 From: noreplyo0dt6snn at sandfordpartners.mom (Linderung von Wellnee) Date: Tue, 24 Mar 2026 11:30:49 +0000 Subject: [Pkg-openssl-devel] =?utf-8?q?Lassen_Sie_sich_von_Knieschmerzen_?= =?utf-8?b?bmljaHQgYXVzYnJlbXNlbuKAi+KAiw==?= Message-ID: <000000000000b6acb5064dc37bdf@google.com> WELLNEE medical grade ? orthopedic comfort Wellnee Kniebandage ? ergonomische Unterst?tzung Revolution?re Kniehilfe: Schmerzfreiheit neu definiert ? Beweglichkeit zur?ckgewinnen ? ohne OP & ohne starke Medikamente* Die Wellnee Kniebandage kombiniert smarte Akupressur-Technologie mit modernem Tragekomfort. Entwickelt, um stechende Schmerzen zu reduzieren, die Durchblutung zu f?rdern und das Knie bei jeder Bewegung zu stabilisieren ? egal ob beim Sport oder im Alltag. ? Pr?zise Passform ? Anatomisch geformt f?r linkes & rechtes Knie ? Silikon-Akupressurpolster ? gezielte Stimulation & Entlastung ? Einheitsgr??e (flexibel) ? verstellbar, atmungsaktiv, nahtlos ? Diskret & alltagstauglich ? unter der Kleidung unsichtbar ? Langlebige Premium-Qualit?t ? waschbar & robust ? LIMITED TIME OFFER ?56.95 70% RABATT Nur heute: nur ?14,95 inkl. Versand! ? JETZT AKTION SICHERN ? 30-Tage-Zufriedenheitsgarantie ? ? Mehr als 180.000 zufriedene Anwender vertrauen Wellnee ? Entdecken Sie die sanfte Alternative. *Die individuellen Ergebnisse k?nnen variieren. Dieses Produkt ersetzt keine ?rztliche Diagnose oder Behandlung. Bei anhaltenden Beschwerden konsultieren Sie bitte Ihren Arzt oder Orthop?den. ? 2026 WELLNEE ? Innovatives Schmerzmanagement. Alle Rechte vorbehalten. jrnp ujoxhlistxhvfhnkltsfsxjrwzgu -------------- next part -------------- An HTML attachment was scrubbed... URL: From pkk at spth.de Thu Mar 26 07:33:57 2026 From: pkk at spth.de (Philipp Klaus Krause) Date: Thu, 26 Mar 2026 08:33:57 +0100 Subject: [Pkg-openssl-devel] Bug#1131904: libssl3t64: "LS alert, bad record mac (532)" / "decryption failed or bad record mac" since 3.6.1 on ppc64 Message-ID: <177451043783.830883.3277498204805414604.reportbug@nemesis> Package: libssl3t64 Version: 3.6.0-2 Severity: normal X-Debbugs-Cc: debian-powerpc at lists.debian.org, pkk at spth.de User: debian-powerpc at lists.debian.org Usertags: ppc64 Dear Maintainer, about a week ago, I upgraded libssl3t64 on my ppc64 system to 3.6.1-3. This resulted in failures (see below). After downgrading to 3.6.0-2, the failures disappeared. An amd64 system on the same network was not affected (there 3.6.1 works). Failure example: philipp at nemesis:/tmp$ curl --verbose https://www.google.com * Host www.google.com:443 was resolved. * IPv6: 2001:4860:482d:7700::, 2001:4860:4829:7700::, 2001:4860:4827:7700::, 2001:4860:482c:7700::, 2001:4860:4828:7700::, 2001:4860:482a:7700::, 2001:4860:482b:7700::, 2001:4860:4826:7700:: * IPv4: 142.251.156.119, 142.251.154.119, 142.251.152.119, 142.251.150.119, 142.251.155.119, 142.251.153.119, 142.251.157.119, 142.251.151.119 * Trying [2001:4860:482d:7700::]:443... * ALPN: curl offers h2,http/1.1 * TLSv1.3 (OUT), TLS handshake, Client hello (1): * SSL Trust Anchors: * CAfile: /etc/ssl/certs/ca-certificates.crt * CApath: /etc/ssl/certs * TLSv1.3 (IN), TLS handshake, Server hello (2): * TLSv1.3 (IN), TLS change cipher, Change cipher spec (1): * TLSv1.3 (OUT), TLS alert, bad record mac (532): * TLS connect error: error:0A000119:SSL routines::decryption failed or bad record mac * closing connection #0 curl: (35) TLS connect error: error:0A000119:SSL routines::decryption failed or bad record mac -- System Information: Debian Release: forky/sid APT prefers unreleased APT policy: (500, 'unreleased'), (500, 'unstable') Architecture: ppc64 Kernel: Linux 6.19.8+deb14-powerpc64-64k (SMP w/176 CPU threads; PREEMPT) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages libssl3t64 depends on: ii libc6 2.42-13 ii libzstd1 1.5.7+dfsg-3+b1 ii openssl-provider-legacy 3.6.1-3 ii zlib1g 1:1.3.dfsg+really1.3.1-3 libssl3t64 recommends no packages. libssl3t64 suggests no packages. -- no debconf information From noloader at gmail.com Thu Mar 26 18:07:21 2026 From: noloader at gmail.com (Jeffrey Walton) Date: Thu, 26 Mar 2026 14:07:21 -0400 Subject: [Pkg-openssl-devel] Bug#1131904: libssl3t64: "LS alert, bad record mac (532)" / "decryption failed or bad record mac" since 3.6.1 on ppc64 In-Reply-To: <177451043783.830883.3277498204805414604.reportbug@nemesis> References: <177451043783.830883.3277498204805414604.reportbug@nemesis> <177451043783.830883.3277498204805414604.reportbug@nemesis> Message-ID: On Thu, Mar 26, 2026 at 3:35?AM Philipp Klaus Krause wrote: > > Package: libssl3t64 > Version: 3.6.0-2 > Severity: normal > X-Debbugs-Cc: debian-powerpc at lists.debian.org, pkk at spth.de > User: debian-powerpc at lists.debian.org > Usertags: ppc64 > > Dear Maintainer, > > about a week ago, I upgraded libssl3t64 on my ppc64 system to 3.6.1-3. This resulted in failures (see below). After downgrading to 3.6.0-2, the failures disappeared. An amd64 system on the same network was not affected (there 3.6.1 works). > > Failure example: > > philipp at nemesis:/tmp$ curl --verbose https://www.google.com > * Host www.google.com:443 was resolved. > * IPv6: 2001:4860:482d:7700::, 2001:4860:4829:7700::, 2001:4860:4827:7700::, 2001:4860:482c:7700::, 2001:4860:4828:7700::, 2001:4860:482a:7700::, 2001:4860:482b:7700::, 2001:4860:4826:7700:: > * IPv4: 142.251.156.119, 142.251.154.119, 142.251.152.119, 142.251.150.119, 142.251.155.119, 142.251.153.119, 142.251.157.119, 142.251.151.119 > * Trying [2001:4860:482d:7700::]:443... > * ALPN: curl offers h2,http/1.1 > * TLSv1.3 (OUT), TLS handshake, Client hello (1): > * SSL Trust Anchors: > * CAfile: /etc/ssl/certs/ca-certificates.crt > * CApath: /etc/ssl/certs > * TLSv1.3 (IN), TLS handshake, Server hello (2): > * TLSv1.3 (IN), TLS change cipher, Change cipher spec (1): > * TLSv1.3 (OUT), TLS alert, bad record mac (532): > * TLS connect error: error:0A000119:SSL routines::decryption failed or bad record mac > * closing connection #0 > curl: (35) TLS connect error: error:0A000119:SSL routines::decryption failed or bad record mac > > -- System Information: > Debian Release: forky/sid > APT prefers unreleased > APT policy: (500, 'unreleased'), (500, 'unstable') > Architecture: ppc64 > > Kernel: Linux 6.19.8+deb14-powerpc64-64k (SMP w/176 CPU threads; PREEMPT) > Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set > Shell: /bin/sh linked to /usr/bin/dash > Init: systemd (via /run/systemd/system) > LSM: AppArmor: enabled > > Versions of packages libssl3t64 depends on: > ii libc6 2.42-13 > ii libzstd1 1.5.7+dfsg-3+b1 > ii openssl-provider-legacy 3.6.1-3 > ii zlib1g 1:1.3.dfsg+really1.3.1-3 > > libssl3t64 recommends no packages. > > libssl3t64 suggests no packages. > > -- no debconf information Interesting... 3.6.1-3 looks Ok on ppc64 and ppc64el according to . Out of morbid curiosity... Is there any particular reason you need openssl-provider-legacy? Is something holding you back from using the modern version of OpenSSL? Also see the OSSL_PROVIDER-LEGACY(7SSL) man page, . Jeff From noloader at gmail.com Thu Mar 26 18:07:21 2026 From: noloader at gmail.com (Jeffrey Walton) Date: Thu, 26 Mar 2026 14:07:21 -0400 Subject: [Pkg-openssl-devel] Bug#1131904: libssl3t64: "LS alert, bad record mac (532)" / "decryption failed or bad record mac" since 3.6.1 on ppc64 In-Reply-To: <177451043783.830883.3277498204805414604.reportbug@nemesis> References: <177451043783.830883.3277498204805414604.reportbug@nemesis> <177451043783.830883.3277498204805414604.reportbug@nemesis> Message-ID: On Thu, Mar 26, 2026 at 3:35?AM Philipp Klaus Krause wrote: > > Package: libssl3t64 > Version: 3.6.0-2 > Severity: normal > X-Debbugs-Cc: debian-powerpc at lists.debian.org, pkk at spth.de > User: debian-powerpc at lists.debian.org > Usertags: ppc64 > > Dear Maintainer, > > about a week ago, I upgraded libssl3t64 on my ppc64 system to 3.6.1-3. This resulted in failures (see below). After downgrading to 3.6.0-2, the failures disappeared. An amd64 system on the same network was not affected (there 3.6.1 works). > > Failure example: > > philipp at nemesis:/tmp$ curl --verbose https://www.google.com > * Host www.google.com:443 was resolved. > * IPv6: 2001:4860:482d:7700::, 2001:4860:4829:7700::, 2001:4860:4827:7700::, 2001:4860:482c:7700::, 2001:4860:4828:7700::, 2001:4860:482a:7700::, 2001:4860:482b:7700::, 2001:4860:4826:7700:: > * IPv4: 142.251.156.119, 142.251.154.119, 142.251.152.119, 142.251.150.119, 142.251.155.119, 142.251.153.119, 142.251.157.119, 142.251.151.119 > * Trying [2001:4860:482d:7700::]:443... > * ALPN: curl offers h2,http/1.1 > * TLSv1.3 (OUT), TLS handshake, Client hello (1): > * SSL Trust Anchors: > * CAfile: /etc/ssl/certs/ca-certificates.crt > * CApath: /etc/ssl/certs > * TLSv1.3 (IN), TLS handshake, Server hello (2): > * TLSv1.3 (IN), TLS change cipher, Change cipher spec (1): > * TLSv1.3 (OUT), TLS alert, bad record mac (532): > * TLS connect error: error:0A000119:SSL routines::decryption failed or bad record mac > * closing connection #0 > curl: (35) TLS connect error: error:0A000119:SSL routines::decryption failed or bad record mac > > -- System Information: > Debian Release: forky/sid > APT prefers unreleased > APT policy: (500, 'unreleased'), (500, 'unstable') > Architecture: ppc64 > > Kernel: Linux 6.19.8+deb14-powerpc64-64k (SMP w/176 CPU threads; PREEMPT) > Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set > Shell: /bin/sh linked to /usr/bin/dash > Init: systemd (via /run/systemd/system) > LSM: AppArmor: enabled > > Versions of packages libssl3t64 depends on: > ii libc6 2.42-13 > ii libzstd1 1.5.7+dfsg-3+b1 > ii openssl-provider-legacy 3.6.1-3 > ii zlib1g 1:1.3.dfsg+really1.3.1-3 > > libssl3t64 recommends no packages. > > libssl3t64 suggests no packages. > > -- no debconf information Interesting... 3.6.1-3 looks Ok on ppc64 and ppc64el according to . Out of morbid curiosity... Is there any particular reason you need openssl-provider-legacy? Is something holding you back from using the modern version of OpenSSL? Also see the OSSL_PROVIDER-LEGACY(7SSL) man page, . Jeff From sebastian at breakpoint.cc Thu Mar 26 18:15:39 2026 From: sebastian at breakpoint.cc (Sebastian Andrzej Siewior) Date: Thu, 26 Mar 2026 19:15:39 +0100 Subject: [Pkg-openssl-devel] Bug#1131904: libssl3t64: "LS alert, bad record mac (532)" / "decryption failed or bad record mac" since 3.6.1 on ppc64 In-Reply-To: <177451043783.830883.3277498204805414604.reportbug@nemesis> References: <177451043783.830883.3277498204805414604.reportbug@nemesis> <177451043783.830883.3277498204805414604.reportbug@nemesis> Message-ID: <20260326181539.zlaXl77d@breakpoint.cc> On 2026-03-26 08:33:57 [+0100], Philipp Klaus Krause wrote: > Dear Maintainer, > > about a week ago, I upgraded libssl3t64 on my ppc64 system to 3.6.1-3. > This resulted in failures (see below). After downgrading to 3.6.0-2, > the failures disappeared. An amd64 system on the same network was not > affected (there 3.6.1 works). ? > Architecture: ppc64 > > Kernel: Linux 6.19.8+deb14-powerpc64-64k (SMP w/176 CPU threads; PREEMPT) I probably should extend this. What does openssl version -a say for CPUINFO and does it work if you mask 0x10 out of it? say OPENSSL_ppccap=0x2e curl $bla ? Sebastian From pkk at spth.de Thu Mar 26 20:47:49 2026 From: pkk at spth.de (Philipp Klaus Krause) Date: Thu, 26 Mar 2026 21:47:49 +0100 Subject: [Pkg-openssl-devel] Bug#1131904: libssl3t64: "LS alert, bad record mac (532)" / "decryption failed or bad record mac" since 3.6.1 on ppc64 In-Reply-To: <20260326181539.zlaXl77d@breakpoint.cc> References: <177451043783.830883.3277498204805414604.reportbug@nemesis> <20260326181539.zlaXl77d@breakpoint.cc> <177451043783.830883.3277498204805414604.reportbug@nemesis> Message-ID: <2dbc6134-5f40-42e6-9344-39994e531b9e@spth.de> Am 26.03.26 um 19:15 schrieb Sebastian Andrzej Siewior: > > I probably should extend this. What does > openssl version -a > > say for CPUINFO and does it work if you mask 0x10 out of it? > > say > OPENSSL_ppccap=0x2e curl $bla > > ? CPUINFO: OPENSSL_ppccap=0x3e And OPENSSL_ppccap=0x2e curl works fine as a workaround. Philipp From sebastian at breakpoint.cc Thu Mar 26 20:56:02 2026 From: sebastian at breakpoint.cc (Sebastian Andrzej Siewior) Date: Thu, 26 Mar 2026 21:56:02 +0100 Subject: [Pkg-openssl-devel] Bug#1131904: libssl3t64: "LS alert, bad record mac (532)" / "decryption failed or bad record mac" since 3.6.1 on ppc64 In-Reply-To: <2dbc6134-5f40-42e6-9344-39994e531b9e@spth.de> References: <177451043783.830883.3277498204805414604.reportbug@nemesis> <20260326181539.zlaXl77d@breakpoint.cc> <2dbc6134-5f40-42e6-9344-39994e531b9e@spth.de> <177451043783.830883.3277498204805414604.reportbug@nemesis> Message-ID: <20260326205602.t8fWOOmZ@breakpoint.cc> On 2026-03-26 21:47:49 [+0100], Philipp Klaus Krause wrote: > > CPUINFO: OPENSSL_ppccap=0x3e What kind of a machine is it? Just to statisfy my curiosity. > And OPENSSL_ppccap=0x2e curl works fine as a workaround. How urgent of an update is this would you say? I would wait to 3.6.2 which should be out in a week or two. > Philipp Sebastian From pkk at spth.de Thu Mar 26 20:50:39 2026 From: pkk at spth.de (Philipp Klaus Krause) Date: Thu, 26 Mar 2026 21:50:39 +0100 Subject: [Pkg-openssl-devel] Bug#1131904: libssl3t64: "LS alert, bad record mac (532)" / "decryption failed or bad record mac" since 3.6.1 on ppc64 In-Reply-To: References: <177451043783.830883.3277498204805414604.reportbug@nemesis> <177451043783.830883.3277498204805414604.reportbug@nemesis> Message-ID: <214d6b58-f14f-4e28-b565-34f2d7af9652@spth.de> Am 26.03.26 um 19:07 schrieb Jeffrey Walton: >> >> Versions of packages libssl3t64 depends on: >> ii libc6 2.42-13 >> ii libzstd1 1.5.7+dfsg-3+b1 >> ii openssl-provider-legacy 3.6.1-3 >> ii zlib1g 1:1.3.dfsg+really1.3.1-3 >> >> libssl3t64 recommends no packages. >> >> libssl3t64 suggests no packages. >> >> -- no debconf information > > Interesting... 3.6.1-3 looks Ok on ppc64 and ppc64el according to > . > > Out of morbid curiosity... Is there any particular reason you need > openssl-provider-legacy? Is something holding you back from using the > modern version of OpenSSL? Also see the OSSL_PROVIDER-LEGACY(7SSL) > man page, . > > Jeff I have no idea about this stuff; installed the machine 3 years ago, and have done an apt-get dist-upgrade once in a while, not really thinking about openssl until I ran into this bug. But as far as I can see, lots of stuff depends on libssl3t64, and libssl3t64 depends on openssl-provider-legacy, so I guess I need it? Philipp From pkk at spth.de Thu Mar 26 20:50:39 2026 From: pkk at spth.de (Philipp Klaus Krause) Date: Thu, 26 Mar 2026 21:50:39 +0100 Subject: [Pkg-openssl-devel] Bug#1131904: libssl3t64: "LS alert, bad record mac (532)" / "decryption failed or bad record mac" since 3.6.1 on ppc64 In-Reply-To: References: <177451043783.830883.3277498204805414604.reportbug@nemesis> <177451043783.830883.3277498204805414604.reportbug@nemesis> Message-ID: <214d6b58-f14f-4e28-b565-34f2d7af9652@spth.de> Am 26.03.26 um 19:07 schrieb Jeffrey Walton: >> >> Versions of packages libssl3t64 depends on: >> ii libc6 2.42-13 >> ii libzstd1 1.5.7+dfsg-3+b1 >> ii openssl-provider-legacy 3.6.1-3 >> ii zlib1g 1:1.3.dfsg+really1.3.1-3 >> >> libssl3t64 recommends no packages. >> >> libssl3t64 suggests no packages. >> >> -- no debconf information > > Interesting... 3.6.1-3 looks Ok on ppc64 and ppc64el according to > . > > Out of morbid curiosity... Is there any particular reason you need > openssl-provider-legacy? Is something holding you back from using the > modern version of OpenSSL? Also see the OSSL_PROVIDER-LEGACY(7SSL) > man page, . > > Jeff I have no idea about this stuff; installed the machine 3 years ago, and have done an apt-get dist-upgrade once in a while, not really thinking about openssl until I ran into this bug. But as far as I can see, lots of stuff depends on libssl3t64, and libssl3t64 depends on openssl-provider-legacy, so I guess I need it? Philipp From pkk at spth.de Thu Mar 26 21:14:12 2026 From: pkk at spth.de (Philipp Klaus Krause) Date: Thu, 26 Mar 2026 22:14:12 +0100 Subject: [Pkg-openssl-devel] Bug#1131904: libssl3t64: "LS alert, bad record mac (532)" / "decryption failed or bad record mac" since 3.6.1 on ppc64 In-Reply-To: <20260326205602.t8fWOOmZ@breakpoint.cc> References: <177451043783.830883.3277498204805414604.reportbug@nemesis> <20260326181539.zlaXl77d@breakpoint.cc> <2dbc6134-5f40-42e6-9344-39994e531b9e@spth.de> <20260326205602.t8fWOOmZ@breakpoint.cc> <177451043783.830883.3277498204805414604.reportbug@nemesis> Message-ID: Am 26.03.26 um 21:56 schrieb Sebastian Andrzej Siewior: > On 2026-03-26 21:47:49 [+0100], Philipp Klaus Krause wrote: >> >> CPUINFO: OPENSSL_ppccap=0x3e > > What kind of a machine is it? Just to statisfy my curiosity. philipp at nemesis:/tmp$ tail -n 12 /proc/cpuinfo processor : 175 cpu : POWER9 (raw), altivec supported clock : 2600.000000MHz revision : 2.2 (pvr 004e 1202) timebase : 512000000 platform : PowerNV model : T2P9S01 REV 1.01 machine : PowerNV T2P9S01 REV 1.01 firmware : OPAL MMU : Radix >> And OPENSSL_ppccap=0x2e curl works fine as a workaround. > > How urgent of an update is this would you say? I would wait to 3.6.2 > which should be out in a week or two. For me personally, not urgent. I just downgraded to libssl3t64 3.6.0-2 for now. Philipp From ftpmaster at ftp-master.debian.org Thu Mar 26 21:39:23 2026 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Thu, 26 Mar 2026 21:39:23 +0000 Subject: [Pkg-openssl-devel] Processing of openssl_4.0.0~beta1-1_source.changes Message-ID: openssl_4.0.0~beta1-1_source.changes uploaded successfully to localhost along with the files: openssl_4.0.0~beta1-1.dsc openssl_4.0.0~beta1.orig.tar.gz openssl_4.0.0~beta1.orig.tar.gz.asc openssl_4.0.0~beta1-1.debian.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org) From ftpmaster at ftp-master.debian.org Thu Mar 26 21:51:05 2026 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Thu, 26 Mar 2026 21:51:05 +0000 Subject: [Pkg-openssl-devel] openssl_4.0.0~beta1-1_source.changes REJECTED Message-ID: Source-only uploads to NEW are not allowed. binary:libcrypto4-udeb is NEW. binary:libssl4-udeb is NEW. === Please feel free to respond to this email if you don't understand why your files were rejected, or if you upload new files which address our concerns. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 228 bytes Desc: not available URL: From sebastian at breakpoint.cc Thu Mar 26 22:08:28 2026 From: sebastian at breakpoint.cc (Sebastian Andrzej Siewior) Date: Thu, 26 Mar 2026 23:08:28 +0100 Subject: [Pkg-openssl-devel] openssl_4.0.0~beta1-1_source.changes REJECTED In-Reply-To: References: Message-ID: <20260326220828.hNVjPlRq@breakpoint.cc> On 2026-03-26 21:51:05 [+0000], Debian FTP Masters wrote: > > > Source-only uploads to NEW are not allowed. > > binary:libcrypto4-udeb is NEW. > binary:libssl4-udeb is NEW. is this a mistake? https://packages.debian.org/experimental/libcrypto4-udeb https://packages.debian.org/experimental/libssl4-udeb Sebastian From ecoaccrainacc at gmail.com Fri Mar 27 07:46:48 2026 From: ecoaccrainacc at gmail.com (Miras Alikhan) Date: 27 Mar 2026 08:46:48 +0100 Subject: [Pkg-openssl-devel] We are interested in your products Message-ID: <20260327062912.9F17DFE46902D308@gmail.com> Attn: Supplier, My name are Miras Alikhan, from Alikhan Global Trading LLP. and we got your Company's info through an exhaustive search on our internet and we are authorized business agents, it will be our pleasure you supply us your standard products as been listed in your website and we will also appreciate it more if you can send the following: 1. Your company profile. 2. The Technical details and price of your products We hope this could be a start for a long term business relationship with your company. Best Regards, Miras Alikhan "CEO / Buyer Agent" Alikhan Global Trading LLP. Zhastar street, 11/2, Astana 10110, Republic of Kazakhstan. From ashokkuuu98 at gmail.com Fri Mar 27 13:32:47 2026 From: ashokkuuu98 at gmail.com (Saudi Group) Date: Fri, 27 Mar 2026 06:32:47 -0700 (PDT) Subject: [Pkg-openssl-devel] Loan Proposal Message-ID: <69c686ff.050a0220.23022.761b@mx.google.com> Loan Application Assalamu Alaikum, pkg-openssl-devel! I hope this message finds you in good health. Am Faisal Rasheed, representing a group of investors from Saudi Arabia dedicated to providing financial support for businesses and projects. If you are exploring funding options, we would be pleased to discuss how we can assist. Kindly share the amount you need and your preferred loan duration, and I will consult with our investors to identify financing options that align with your business or project needs. I look forward to your response. Warm regards, Faisal Rasheed Investors Group Representative -------------- next part -------------- An HTML attachment was scrubbed... URL: From glaubitz at physik.fu-berlin.de Sat Mar 28 22:07:06 2026 From: glaubitz at physik.fu-berlin.de (John Paul Adrian Glaubitz) Date: Sat, 28 Mar 2026 23:07:06 +0100 Subject: [Pkg-openssl-devel] Bug#1131904: libssl3t64: "LS alert, bad record mac (532)" / "decryption failed or bad record mac" since 3.6.1 on ppc64 In-Reply-To: <177451043783.830883.3277498204805414604.reportbug@nemesis> References: <177451043783.830883.3277498204805414604.reportbug@nemesis> <177451043783.830883.3277498204805414604.reportbug@nemesis> Message-ID: Hi Philipp, On Thu, 2026-03-26 at 08:33 +0100, Philipp Klaus Krause wrote: > about a week ago, I upgraded libssl3t64 on my ppc64 system to 3.6.1-3. This resulted in failures (see below). After downgrading to 3.6.0-2, the failures disappeared. An amd64 system on the same network was not affected (there 3.6.1 works). > > Failure example: > > philipp at nemesis:/tmp$ curl --verbose https://www.google.com > * Host www.google.com:443 was resolved. > * IPv6: 2001:4860:482d:7700::, 2001:4860:4829:7700::, 2001:4860:4827:7700::, 2001:4860:482c:7700::, 2001:4860:4828:7700::, 2001:4860:482a:7700::, 2001:4860:482b:7700::, 2001:4860:4826:7700:: > * IPv4: 142.251.156.119, 142.251.154.119, 142.251.152.119, 142.251.150.119, 142.251.155.119, 142.251.153.119, 142.251.157.119, 142.251.151.119 > * Trying [2001:4860:482d:7700::]:443... > * ALPN: curl offers h2,http/1.1 > * TLSv1.3 (OUT), TLS handshake, Client hello (1): > * SSL Trust Anchors: > * CAfile: /etc/ssl/certs/ca-certificates.crt > * CApath: /etc/ssl/certs > * TLSv1.3 (IN), TLS handshake, Server hello (2): > * TLSv1.3 (IN), TLS change cipher, Change cipher spec (1): > * TLSv1.3 (OUT), TLS alert, bad record mac (532): > * TLS connect error: error:0A000119:SSL routines::decryption failed or bad record mac > * closing connection #0 > curl: (35) TLS connect error: error:0A000119:SSL routines::decryption failed or bad record mac I suggest reporting this issue upstream: https://github.com/openssl/openssl/issues Adrian -- .''`. John Paul Adrian Glaubitz : :' : Debian Developer `. `' Physicist `- GPG: 62FF 8A75 84E0 2956 9546 0006 7426 3B37 F5B5 F913 From sebastian at breakpoint.cc Sun Mar 29 12:01:05 2026 From: sebastian at breakpoint.cc (Sebastian Andrzej Siewior) Date: Sun, 29 Mar 2026 13:01:05 +0200 Subject: [Pkg-openssl-devel] Bug#1131904: Bug#1131904: libssl3t64: "LS alert, bad record mac (532)" / "decryption failed or bad record mac" since 3.6.1 on ppc64 In-Reply-To: References: <177451043783.830883.3277498204805414604.reportbug@nemesis> <177451043783.830883.3277498204805414604.reportbug@nemesis> <177451043783.830883.3277498204805414604.reportbug@nemesis> Message-ID: <20260329110105.bHfpuvn4@breakpoint.cc> On 2026-03-28 23:07:06 [+0100], John Paul Adrian Glaubitz wrote: > I suggest reporting this issue upstream: https://github.com/openssl/openssl/issues You do realise that I have it under control and that there are no further steps required from Philipp? > Adrian Sebastian From glaubitz at physik.fu-berlin.de Sun Mar 29 12:20:04 2026 From: glaubitz at physik.fu-berlin.de (John Paul Adrian Glaubitz) Date: Sun, 29 Mar 2026 13:20:04 +0200 Subject: [Pkg-openssl-devel] Bug#1131904: Bug#1131904: libssl3t64: "LS alert, bad record mac (532)" / "decryption failed or bad record mac" since 3.6.1 on ppc64 In-Reply-To: <20260329110105.bHfpuvn4@breakpoint.cc> References: <177451043783.830883.3277498204805414604.reportbug@nemesis> <177451043783.830883.3277498204805414604.reportbug@nemesis> <20260329110105.bHfpuvn4@breakpoint.cc> <177451043783.830883.3277498204805414604.reportbug@nemesis> Message-ID: <91151d9830e71f677fda65aa445e988a61330201.camel@physik.fu-berlin.de> On Sun, 2026-03-29 at 13:01 +0200, Sebastian Andrzej Siewior wrote: > On 2026-03-28 23:07:06 [+0100], John Paul Adrian Glaubitz wrote: > > I suggest reporting this issue upstream: https://github.com/openssl/openssl/issues > > You do realise that I have it under control and that there are no > further steps required from Philipp? I actually don't as the debian-powerpc mailing list wasn't kept in the loop. Adrian -- .''`. John Paul Adrian Glaubitz : :' : Debian Developer `. `' Physicist `- GPG: 62FF 8A75 84E0 2956 9546 0006 7426 3B37 F5B5 F913