Control: -1 severity important
Quack,
This problem is solved in unstable and should not prevent this package
from entering testing.
\_o<
--
Marc Dequènes
I literally poked that patch into debian/patches{/series}, quilt
applied it and rebuilt, and it started working for me. Maybe there's
something different about our configs?
Strange, that patch seems to slightly change how the hardcoded dh params are
loaded, but it doesn't seem to change the size
Processing control commands:
> unblock 907015 by -1
Bug #907015 [src:openssl] openssl version 1.1.1 breaks multiple reverse
dependencies; versioned Breaks needed
907015 was blocked by: 897643 900161 907340 900157 900982 891625 898804 898807
907033 891665 907339 906981 900156 898800 907168 907215
Control: unblock 907015 by -1
On Sat, Sep 29, 2018 at 06:53:27PM +0200, Sebastian Andrzej Siewior wrote:
> On 2018-08-29 11:38:54 [-0600], dann frazier wrote:
> > > > error:141a318a:ssl routines:tls_process_ske_dhe:dh key too small
> > > >
> > > > I found that backporting bip 0.9.0~rc3-1 to jessi
On 2018-08-29 11:38:54 [-0600], dann frazier wrote:
> > > error:141a318a:ssl routines:tls_process_ske_dhe:dh key too small
> > >
> > > I found that backporting bip 0.9.0~rc3-1 to jessie worked. I further found
> > > that just cherry-picking the following commit back to bip 0.8.9 seems to
> > > be
On Tue, Aug 28, 2018 at 09:53:58AM -0300, Antonio Terceiro wrote:
> On Thu, Aug 23, 2018 at 03:24:52PM -0600, dann frazier wrote:
> > Package: bip
> > Version: 0.8.9-1.1
> > Severity: normal
> > Tags: patch
> >
> > I run bip on a stretch system, and connect to it from a hexchat client on
> > sid.
Control: severity -1 important
Hi,
I would like to reinforce the request for a stable update:
- according to the openssl maintainer, this is a security issue and
should be fixed in stable
- without such fix, bip on stable will soon be unusable to any client
using a recent enough openssl
s
7 matches
Mail list logo