On 2023-10-02 13:41:17 [+0200], Cyril Brulebois wrote:
> Adam D. Barratt (2023-10-02):
> > Unfortunately, the version format change from -0+deb11uX to -0~deb11uX
> > has broken the installer.
> >
> > The udebs end up with dependencies of the form ">= 1.1.1w", which
> > 1.1.1w-0~deb11u1 doesn't
Adam D. Barratt (2023-10-02):
> Unfortunately, the version format change from -0+deb11uX to -0~deb11uX
> has broken the installer.
>
> The udebs end up with dependencies of the form ">= 1.1.1w", which
> 1.1.1w-0~deb11u1 doesn't fulfil. Assuming I'm not missing anything,
> could we have an upload
On Wed, 2023-09-13 at 22:48 +0200, Sebastian Andrzej Siewior wrote:
> OpenSSL upstream released 1.1.1w which the last stable update to the
> 1.1.1 series because it is EOL since last Monday.
> The update is fairly small and contains a few fixes for memory leaks.
> The mentioned CVE affects only
Hi,
Sebastian Andrzej Siewior (2023-09-13):
> Package: release.debian.org
> Control: affects -1 + src:openssl
> User: release.debian@packages.debian.org
> Usertags: pu
> Tags: bullseye
> Severity: normal
>
> OpenSSL upstream released 1.1.1w which the last stable update to the
> 1.1.1 series
Package: release.debian.org
Control: affects -1 + src:openssl
User: release.debian@packages.debian.org
Usertags: pu
Tags: bullseye
Severity: normal
OpenSSL upstream released 1.1.1w which the last stable update to the
1.1.1 series because it is EOL since last Monday.
The update is fairly small
5 matches
Mail list logo