Debian Patches
Status for openssl/3.6.0-2
| Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
|---|---|---|---|---|---|---|
| debian-targets.patch | debian-targets | Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org> | no | 2017-11-05 | ||
| man-section.patch | man-section | Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org> | no | 2017-11-05 | ||
| Configure-allow-to-enable-ktls-if-target-does-not-start-w.patch | Configure: allow to enable ktls if target does not start with Linux The Debian build system uses a `debian' target which sets CFLAGS and then we have for instance debian-amd64 which inherits from linux-x86_64 and debian. So far so good. Since the target name does not start with `linux', the build system does not enable ktls. So in order to get enabled, I added a `enable => [ "ktls" ],' to the generic linux config which sets it explicit). Having this set, we can check for it instead matching the target name. This commit is based on changes for afalgeng in commit 9e381e8a01859 ("Configure: allow to enable afalgeng if target does not start with Linux") |
Sebastian Andrzej Siewior <sebastian@breakpoint.cc> | no | 2021-04-01 | ||
| Fixed-non-compliant-handling-of-missing-stapled-OCSP-resp.patch | Fixed non-compliant handling of missing stapled OCSP responses If the OCSP response was not present for a certificate the server created a non-conforming empty CertificateStatus extension instead of not sending the extension at all. Fixes #28902 Fixes b1b4b154 (Merged from https://github.com/openssl/openssl/pull/28955) (cherry picked from commit c5c8b44f0f66f8edf5d6035705f15f3e55265798) |
martin <rauch.martin@gmail.com> | no | 2025-10-19 |
All known versions for source package 'openssl'
- 3.6.0-2 (experimental)
- 3.5.4-1 (sid, forky)
- 3.5.4-1~deb13u1 (trixie)
- 3.5.1-1+deb13u1 (trixie-security)
- 3.0.18-1~deb12u1 (bookworm)
- 3.0.17-1~deb12u3 (bookworm-security)
- 3.0.17-1~deb12u2 (bookworm-updates)
- 3.0.14-1~deb12u1 (bookworm-backports)
