Your message dated Sun, 05 Mar 2023 23:35:28 +0000
with message-id <[email protected]>
and subject line Bug#1032070: fixed in ruby3.1 3.1.2-7~exp
has caused the Debian Bug report #1032070,
regarding Update openssl gem to 3.0.1 to fix Exception: EVP_PKEY_new_mac_key: 
malloc failure
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1032070: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032070
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: libruby3.1
Severity: important
Version: 3.1.2-6

While testing gitlab 15.6.8 on experimental, gitlab-rake gitlab:check command failed with following error,

Checking Gitaly ...

Gitaly: ... Exception: EVP_PKEY_new_mac_key: malloc failure

Checking Gitaly ... Finished

Looking around for this error, I found https://stackoverflow.com/questions/74300774/opensslhmacerror-evp-pkey-new-mac-key-malloc-failure-in-rails-app and from there https://github.com/jwt/ruby-jwt/pull/530#discussion_r1002904506 which indicated this is fixed in openssl 3.0.1 gem. Does ruby 3.1.3 include openssl 3.0.1? If not, can we update just the openssl part?

This will help us to run gitlab on bookworm eventually.

--- End Message ---
--- Begin Message ---
Source: ruby3.1
Source-Version: 3.1.2-7~exp
Done: Antonio Terceiro <[email protected]>

We believe that the bug you reported is fixed in the latest version of
ruby3.1, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Antonio Terceiro <[email protected]> (supplier of updated ruby3.1 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sun, 05 Mar 2023 17:13:36 -0300
Source: ruby3.1
Architecture: source
Version: 3.1.2-7~exp
Distribution: experimental
Urgency: medium
Maintainer: Debian Ruby Team 
<[email protected]>
Changed-By: Antonio Terceiro <[email protected]>
Closes: 1032070
Changes:
 ruby3.1 (3.1.2-7~exp) experimental; urgency=medium
 .
   * Update openssl extension to to 3.0.1 (Closes: #1032070)
Checksums-Sha1:
 6404d7fe8f68b6afb85a5d917188be35caaaab2e 2579 ruby3.1_3.1.2-7~exp.dsc
 1d84e312ea186fa899f8e9c813588fe1b2a184b2 71400 
ruby3.1_3.1.2-7~exp.debian.tar.xz
 c5223902abf2e6bf2ab6e5a79f7bde60d16ffe5a 7690 
ruby3.1_3.1.2-7~exp_source.buildinfo
Checksums-Sha256:
 bec3c0a2ccda95b71805bc5c2ef538b62fe05e41f40dd944b9a11282d85b8f38 2579 
ruby3.1_3.1.2-7~exp.dsc
 0b09fc29fb1287cc2cc32b40c33e29936fd9ef6f2f85c31ccb64c27209ff2dce 71400 
ruby3.1_3.1.2-7~exp.debian.tar.xz
 5ed5a0b19283625a9a132bf1dec49b7f1f78b7de9daa9f554325d569d627e29b 7690 
ruby3.1_3.1.2-7~exp_source.buildinfo
Files:
 cf04f26ae4b9fb1a8868a40daff6f367 2579 ruby optional ruby3.1_3.1.2-7~exp.dsc
 37af61a52cf518666d82eb425bd6bbdc 71400 ruby optional 
ruby3.1_3.1.2-7~exp.debian.tar.xz
 9e1941763a8a84c01fc2000bdbea60c8 7690 ruby optional 
ruby3.1_3.1.2-7~exp_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEst7mYDbECCn80PEM/A2xu81GC94FAmQFI80ACgkQ/A2xu81G
C96p0A/+LkWQ7hlo/U5pnuSz54RvUelC/e0RxGN2BQXRERO+nmv7O2s5C4leFUS6
5UyTsjL6an5ckHZa2hzboGPy4yJPbHCkf3LG6ussPh9CQQlJSuO3wAnKhTrMQDd4
aYvvtRlsKWXR/LbUxplXNK42BZoVDwJyv9gP3fzjkr4GSKc+Vy0PTyfWmEWQSnN6
8xwR5QJVqigGaMCVfuYoEX9RYI0rByNQqJF+PuScUya+N7jjk3flNyB75KyUBtL9
AobBeTu3EWmUQAB/F6jhyq0BNxzt5leJ5MXXapRxGcBAIPXa6/g8BPmlRQ6+7enz
L7jPq2c+9x7fd3JvgiuXpdDAY/zVZ9UOURGscTK1CERm5nKHENWI+brDfdMIyIh3
E6eMyGLY8eYAr0CQwaooxHJawBtcrOuVuBMMNA8yatcEEm+uw01tKWdiEm1FzhGq
N6AX72F9udx1t2nZTvWHJFhnnXkTqaYRohu0JRkdVq9Y3Ez7bjSoS0tP6ocI8ioL
q3iAqWnOfH7jfa/RDAGG5ekSjrzhPp/UwyyIrDcy9XUcymBV2U9FdQjOcnLaecWp
t9JteapPzWfiN/GKlP1B/3XwHuWN1ra0C0M5GG17pD5lhdCsM6FDDpetIaSRKcOD
aG18fqLoLrjM7Ju9oCekyPsp6hE2gWGnnvcQSrAgQOw5y9ZaXhM=
=dvbI
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to