Google Groups no longer supports new Usenet posts or subscriptions. Historical content remains viewable.
Dismiss

Bug#1051884: bullseye-pu: package openssl/1.1.1w-0~deb11u1

36 views
Skip to first unread message

Sebastian Andrzej Siewior

unread,
Sep 13, 2023, 5:00:06 PM9/13/23
to
Package: release.debian.org
Control: affects -1 + src:openssl
User: release.d...@packages.debian.org
Usertags: pu
Tags: bullseye
Severity: normal

OpenSSL upstream released 1.1.1w which the last stable update to the
1.1.1 series because it is EOL since last Monday.
The update is fairly small and contains a few fixes for memory leaks.
The mentioned CVE affects only Windows.

Sebastian
openssl_w.diff

Adam D Barratt

unread,
Sep 16, 2023, 1:50:06 PM9/16/23
to
package release.debian.org
tags 1051884 = bullseye pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into the proposed-updates queue for Debian bullseye.

Thanks for your contribution!

Upload details
==============

Package: openssl
Version: 1.1.1w-0~deb11u1

Explanation: new upstream stable release

Cyril Brulebois

unread,
Oct 2, 2023, 7:30:05 AM10/2/23
to
Hi,

Sebastian Andrzej Siewior <seba...@breakpoint.cc> (2023-09-13):
The updated libssl1.1-udeb cannot be installed:

$ dpkg --info binary-libssl1.1-udeb/libssl1.1-udeb_1.1.1w-0~deb11u1_amd64.udeb | grep Depends
Depends: libc6-udeb (>= 2.31), libcrypto1.1-udeb (>= 1.1.1w)

versus:

libcrypto1.1-udeb | 1.1.1w-0~deb11u1 | oldstable-proposed-updates | amd64, arm64, armel, armhf, i386, mips64el, mipsel, ppc64el, s390x

which leads to:

The following packages have unmet dependencies:
libssl1.1-udeb : Depends: libcrypto1.1-udeb (>= 1.1.1w) but 1.1.1w-0~deb11u1 is to be installed


Cheers,
--
Cyril Brulebois (ki...@debian.org) <https://debamax.com/>
D-I release manager -- Release team member -- Freelance Consultant
signature.asc

Adam D. Barratt

unread,
Oct 2, 2023, 7:40:06 AM10/2/23
to
On Wed, 2023-09-13 at 22:48 +0200, Sebastian Andrzej Siewior wrote:
> OpenSSL upstream released 1.1.1w which the last stable update to the
> 1.1.1 series because it is EOL since last Monday.
> The update is fairly small and contains a few fixes for memory leaks.
> The mentioned CVE affects only Windows.
>

Unfortunately, the version format change from -0+deb11uX to -0~deb11uX
has broken the installer.

The udebs end up with dependencies of the form ">= 1.1.1w", which
1.1.1w-0~deb11u1 doesn't fulfil. Assuming I'm not missing anything,
could we have an upload that uses the -0+ style of versioning ASAP,
please?

Regards,

Adam

Cyril Brulebois

unread,
Oct 2, 2023, 7:50:04 AM10/2/23
to
Adam D. Barratt <ad...@adam-barratt.org.uk> (2023-10-02):
> Unfortunately, the version format change from -0+deb11uX to -0~deb11uX
> has broken the installer.
>
> The udebs end up with dependencies of the form ">= 1.1.1w", which
> 1.1.1w-0~deb11u1 doesn't fulfil. Assuming I'm not missing anything,
> could we have an upload that uses the -0+ style of versioning ASAP,
> please?

Trying to understand the reasons behind the versioning scheme switch, it
seems the debian/bullseye branch is still at 1.1.1v-0~deb11u1 (without a
tag).
signature.asc

Sebastian Andrzej Siewior

unread,
Oct 2, 2023, 10:20:04 AM10/2/23
to
On 2023-10-02 13:41:17 [+0200], Cyril Brulebois wrote:
> Adam D. Barratt <ad...@adam-barratt.org.uk> (2023-10-02):
> > Unfortunately, the version format change from -0+deb11uX to -0~deb11uX
> > has broken the installer.
> >
> > The udebs end up with dependencies of the form ">= 1.1.1w", which
> > 1.1.1w-0~deb11u1 doesn't fulfil. Assuming I'm not missing anything,
> > could we have an upload that uses the -0+ style of versioning ASAP,
> > please?
>
> Trying to understand the reasons behind the versioning scheme switch, it
> seems the debian/bullseye branch is still at 1.1.1v-0~deb11u1 (without a
> tag).

Sorry for that. Just uploaded 1.1.1w-0+deb11u1 which solves that.

> Cheers,

Sebastian

Adam D Barratt

unread,
Oct 2, 2023, 12:10:05 PM10/2/23
to
package release.debian.org
tags 1051884 = bullseye pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into the proposed-updates queue for Debian bullseye.

Thanks for your contribution!

Upload details
==============

Package: openssl
Version: 1.1.1w-0+deb11u1

Explanation: fix udeb dependencies by using -0+ version rather than -0~
0 new messages