[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1051884: bullseye-pu: package openssl/1.1.1w-0~deb11u1



Hi,

Sebastian Andrzej Siewior <sebastian@breakpoint.cc> (2023-09-13):
> Package: release.debian.org
> Control: affects -1 + src:openssl
> User: release.debian.org@packages.debian.org
> Usertags: pu
> Tags: bullseye
> Severity: normal
> 
> OpenSSL upstream released 1.1.1w which the last stable update to the
> 1.1.1 series because it is EOL since last Monday.
> The update is fairly small and contains a few fixes for memory leaks.
> The mentioned CVE affects only Windows.

The updated libssl1.1-udeb cannot be installed:

    $ dpkg --info binary-libssl1.1-udeb/libssl1.1-udeb_1.1.1w-0~deb11u1_amd64.udeb | grep Depends
     Depends: libc6-udeb (>= 2.31), libcrypto1.1-udeb (>= 1.1.1w)

versus:

    libcrypto1.1-udeb | 1.1.1w-0~deb11u1 | oldstable-proposed-updates | amd64, arm64, armel, armhf, i386, mips64el, mipsel, ppc64el, s390x

which leads to:

    The following packages have unmet dependencies:
     libssl1.1-udeb : Depends: libcrypto1.1-udeb (>= 1.1.1w) but 1.1.1w-0~deb11u1 is to be installed


Cheers,
-- 
Cyril Brulebois (kibi@debian.org)            <https://debamax.com/>
D-I release manager -- Release team member -- Freelance Consultant

Attachment: signature.asc
Description: PGP signature


Reply to: