Bug#828408: fixed in libpoe-filter-ssl-perl 0.30-2
Jonathan Wiltshire
jmw at debian.org
Sat Nov 12 18:43:35 UTC 2016
On 2016-11-12 17:57, gregor herrmann wrote:
> On Sat, 12 Nov 2016 18:45:31 +0100, Moritz Muehlenhoff wrote:
>
>> On Sat, Nov 12, 2016 at 04:50:25PM +0000, gregor herrmann wrote:
>> > Source: libpoe-filter-ssl-perl
>> > * Use OpenSSL 1.0.2 for the time being. (Closes: #828408)
>>
>> Don't close such bugs. You used a workaround, but the bug still
>> persists. If there are valid exceptions not to move to openssl 1.1,
>> they should rather be tagged stretch-ignore.
>
> Thanks for your mail.
>
> Indeed I was a bit unsure what to do with this bug (closes or
> downgrade+unblock or close+clone ...), and I've seen this discussed
> on #debian-release earlier today but I didn't see a consensus or
> clear guidance there.
>
> I'm happy to have the release team / security team / OpenSSL
> maintainers change the bug status or tell me what the preferred
> method is, as soon is there is a clear consensus.
stretch-ignore would not be appropriate. If the bug has been worked
around, please downgrade and unblock.
Thanks,
--
Jonathan Wiltshire jmw at debian.org
Debian Developer http://people.debian.org/~jmw
4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3 5394 479D D352 4C51
<directhex> i have six years of solaris sysadmin experience, from
8->10. i am well qualified to say it is made from bonghits
layered on top of bonghits
More information about the pkg-perl-maintainers
mailing list