Bug#828408: fixed in libpoe-filter-ssl-perl 0.30-2

Jonathan Wiltshire jmw at debian.org
Sat Nov 12 18:43:35 UTC 2016


On 2016-11-12 17:57, gregor herrmann wrote:
> On Sat, 12 Nov 2016 18:45:31 +0100, Moritz Muehlenhoff wrote:
> 
>> On Sat, Nov 12, 2016 at 04:50:25PM +0000, gregor herrmann wrote:
>> > Source: libpoe-filter-ssl-perl
>> >    * Use OpenSSL 1.0.2 for the time being. (Closes: #828408)
>> 
>> Don't close such bugs. You used a workaround, but the bug still
>> persists. If there are valid exceptions not to move to openssl 1.1,
>> they should rather be tagged stretch-ignore.
> 
> Thanks for your mail.
> 
> Indeed I was a bit unsure what to do with this bug (closes or
> downgrade+unblock or close+clone ...), and I've seen this discussed
> on #debian-release earlier today but I didn't see a consensus or
> clear guidance there.
> 
> I'm happy to have the release team / security team / OpenSSL
> maintainers change the bug status or tell me what the preferred
> method is, as soon is there is a clear consensus.

stretch-ignore would not be appropriate. If the bug has been worked 
around, please downgrade and unblock.

Thanks,

-- 
Jonathan Wiltshire                                      jmw at debian.org
Debian Developer                         http://people.debian.org/~jmw

4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51

<directhex> i have six years of solaris sysadmin experience, from
             8->10. i am well qualified to say it is made from bonghits
			layered on top of bonghits



More information about the pkg-perl-maintainers mailing list