Hi,
Sebastian Andrzej Siewior <sebastian@breakpoint.cc> (2023-09-13):
> Package: release.debian.org
> Control: affects -1 + src:openssl
> User: release.debian.org@packages.debian.org
> Usertags: pu
> Tags: bullseye
> Severity: normal
>
> OpenSSL upstream released 1.1.1w which the last stable update to the
> 1.1.1 series because it is EOL since last Monday.
> The update is fairly small and contains a few fixes for memory leaks.
> The mentioned CVE affects only Windows.
The updated libssl1.1-udeb cannot be installed:
$ dpkg --info binary-libssl1.1-udeb/libssl1.1-udeb_1.1.1w-0~deb11u1_amd64.udeb | grep Depends
Depends: libc6-udeb (>= 2.31), libcrypto1.1-udeb (>= 1.1.1w)
versus:
libcrypto1.1-udeb | 1.1.1w-0~deb11u1 | oldstable-proposed-updates | amd64, arm64, armel, armhf, i386, mips64el, mipsel, ppc64el, s390x
which leads to:
The following packages have unmet dependencies:
libssl1.1-udeb : Depends: libcrypto1.1-udeb (>= 1.1.1w) but 1.1.1w-0~deb11u1 is to be installed
Cheers,
--
Cyril Brulebois (kibi@debian.org) <https://debamax.com/>
D-I release manager -- Release team member -- Freelance Consultant
Attachment:
signature.asc
Description: PGP signature