[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Bug#828408: fixed in libpoe-filter-ssl-perl 0.30-2



On 2016-11-12 17:57, gregor herrmann wrote:
On Sat, 12 Nov 2016 18:45:31 +0100, Moritz Muehlenhoff wrote:

On Sat, Nov 12, 2016 at 04:50:25PM +0000, gregor herrmann wrote:
> Source: libpoe-filter-ssl-perl
>    * Use OpenSSL 1.0.2 for the time being. (Closes: #828408)

Don't close such bugs. You used a workaround, but the bug still
persists. If there are valid exceptions not to move to openssl 1.1,
they should rather be tagged stretch-ignore.

Thanks for your mail.

Indeed I was a bit unsure what to do with this bug (closes or
downgrade+unblock or close+clone ...), and I've seen this discussed
on #debian-release earlier today but I didn't see a consensus or
clear guidance there.

I'm happy to have the release team / security team / OpenSSL
maintainers change the bug status or tell me what the preferred
method is, as soon is there is a clear consensus.

stretch-ignore would not be appropriate. If the bug has been worked around, please downgrade and unblock.

Thanks,

--
Jonathan Wiltshire                                      jmw@debian.org
Debian Developer                         http://people.debian.org/~jmw

4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51

<directhex> i have six years of solaris sysadmin experience, from
            8->10. i am well qualified to say it is made from bonghits
			layered on top of bonghits


Reply to: