Your message dated Sat, 15 Jun 2019 10:20:48 +0200 with message-id <4faa6749-5eda-516d-e906-7e7de9129a1c@debian.org> and subject line Re: Bug#930194: unblock: openssl/1.1.1c-1 has caused the Debian Bug report #930194, regarding unblock: openssl/1.1.1c-1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 930194: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930194 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: submit@bugs.debian.org
- Subject: unblock: openssl/1.1.1c-1
- From: Sebastian Andrzej Siewior <sebastian@breakpoint.cc>
- Date: Sat, 8 Jun 2019 00:35:25 +0200
- Message-id: <[🔎] 20190607223525.c3sbrsxtw277q3fd@flow>
Package: release.debian.org User: release.debian.org@packages.debian.org Usertags: unblock Severity: normal Please unblock package openssl. The updated package is the `c' version, which is the latest upstream release for the 1.1.1 series. This update causes a regresion in the m2crypto test suite which is tracked as #929903. The regression is fixed upstream and I plan to provide an update. There is also a minor report valgrind report about an unitialized memory tracked as #930061. This one will be fixed in the next upload because it is not serious enough to cherry-pick the patch right away. unblock openssl/1.1.1c-1 Sebastian
--- End Message ---
--- Begin Message ---
- To: Sebastian Andrzej Siewior <sebastian@breakpoint.cc>, 930194-done@bugs.debian.org
- Subject: Re: Bug#930194: unblock: openssl/1.1.1c-1
- From: Paul Gevers <elbrus@debian.org>
- Date: Sat, 15 Jun 2019 10:20:48 +0200
- Message-id: <4faa6749-5eda-516d-e906-7e7de9129a1c@debian.org>
- Reply-to: Paul Gevers <elbrus@debian.org>, 930194@bugs.debian.org
- In-reply-to: <[🔎] 5a1c4981-707c-edb8-724a-1dd6cbb0bbba@debian.org>
- References: <[🔎] 20190607223525.c3sbrsxtw277q3fd@flow> <[🔎] a789c3fb-ea20-297c-5cc3-488cf03734c1@debian.org> <[🔎] 20190607223525.c3sbrsxtw277q3fd@flow> <[🔎] 20190608085046.ddonqih24meguui6@flow> <[🔎] f1e956ef-cf86-a0c3-b181-65d96521d630@debian.org> <[🔎] 20190607223525.c3sbrsxtw277q3fd@flow> <[🔎] 5a1c4981-707c-edb8-724a-1dd6cbb0bbba@debian.org>
Hi On 11-06-2019 20:45, Paul Gevers wrote: > I have unblock this from Release Team point of view, but this needs an > ACK from the d-i, hence KiBi in CC. Fully unblocked. PaulAttachment: signature.asc
Description: OpenPGP digital signature
--- End Message ---