Note: This is a public test instance of Red Hat Bugzilla. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback at bugzilla.redhat.com.
Bug 1814314
Summary: | openssl-1.1.1g is available | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Upstream Release Monitoring <upstream-release-monitoring> |
Component: | openssl | Assignee: | Tomas Mraz <tmraz> |
Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | rawhide | CC: | crypto-team, jorton, tmraz |
Target Milestone: | --- | Keywords: | FutureFeature, Triaged |
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | openssl-1.1.1g-1.fc32 openssl-1.1.1g-1.fc30 openssl-1.1.1g-1.fc31 | Doc Type: | --- |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2020-04-26 02:51:03 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Upstream Release Monitoring
2020-03-17 15:55:35 UTC
The following Sources of the specfile are not valid URLs so we cannot automatically build the new version for you. Please use URLs in your Source declarations if possible. - openssl-1.1.1e-hobbled.tar.xz - hobble-openssl - opensslconf-new-warning.h - README.FIPS - ec_curve.c - ectest.c - Makefile.certificate - make-dummy-cert - renew-dummy-cert - opensslconf-new.h Latest upstream release: 1.1.1f Current version/release in rawhide: 1.1.1e-2.fc33 URL: https://www.openssl.org/ Please consult the package updates policy before you issue an update to a stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/ More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream. Based on the information from anitya: https://release-monitoring.org/project/2566/ The following Sources of the specfile are not valid URLs so we cannot automatically build the new version for you. Please use URLs in your Source declarations if possible. - openssl-1.1.1f-hobbled.tar.xz - hobble-openssl - opensslconf-new-warning.h - README.FIPS - ec_curve.c - ectest.c - Makefile.certificate - make-dummy-cert - renew-dummy-cert - opensslconf-new.h Latest upstream release: 1.1.1g Current version/release in rawhide: 1.1.1f-1.fc33 URL: https://www.openssl.org/ Please consult the package updates policy before you issue an update to a stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/ More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream. Based on the information from anitya: https://release-monitoring.org/project/2566/ The following Sources of the specfile are not valid URLs so we cannot automatically build the new version for you. Please use URLs in your Source declarations if possible. - openssl-1.1.1g-hobbled.tar.xz - hobble-openssl - opensslconf-new-warning.h - README.FIPS - ec_curve.c - ectest.c - Makefile.certificate - make-dummy-cert - renew-dummy-cert - opensslconf-new.h FEDORA-2020-fcc91a28e8 has been submitted as an update to Fedora 32. https://bodhi.fedoraproject.org/updates/FEDORA-2020-fcc91a28e8 FEDORA-2020-d7b29838f6 has been submitted as an update to Fedora 31. https://bodhi.fedoraproject.org/updates/FEDORA-2020-d7b29838f6 FEDORA-2020-fcc91a28e8 has been pushed to the Fedora 32 testing repository. In short time you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --advisory=FEDORA-2020-fcc91a28e8` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2020-fcc91a28e8 See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates. FEDORA-2020-d7b29838f6 has been pushed to the Fedora 31 testing repository. In short time you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --advisory=FEDORA-2020-d7b29838f6` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2020-d7b29838f6 See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates. FEDORA-2020-da2d1ef2d7 has been pushed to the Fedora 30 testing repository. In short time you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --advisory=FEDORA-2020-da2d1ef2d7` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2020-da2d1ef2d7 See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates. FEDORA-2020-fcc91a28e8 has been pushed to the Fedora 32 stable repository. If problem still persists, please make note of it in this bug report. FEDORA-2020-da2d1ef2d7 has been pushed to the Fedora 30 stable repository. If problem still persists, please make note of it in this bug report. FEDORA-2020-d7b29838f6 has been pushed to the Fedora 31 stable repository. If problem still persists, please make note of it in this bug report. |