Package: openvpn
Version: 2.5.1-1
Severity: normal

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?
   * What exactly did you do (or not do) that was effective (or
     ineffective)?
   * What was the outcome of this action?
   * What outcome did you expect instead?

*** End of the template - remove these template lines ***


-- System Information:
Debian Release: bullseye/sid
  APT prefers testing-security
  APT policy: (500, 'testing-security'), (500, 'testing'), (90, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-3-amd64 (SMP w/2 CPU threads)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE,
TAINT_UNSIGNED_MODULE
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8),
LANGUAGE=en_GB:en
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages openvpn depends on:
ii  debconf [debconf-2.0]  1.5.75
ii  iproute2               5.10.0-4
ii  libc6                  2.31-11
ii  liblz4-1               1.9.3-1
ii  liblzo2-2              2.10-2
ii  libpam0g               1.4.0-7
ii  libpkcs11-helper1      1.27-1
ii  libssl1.1              1.1.1k-1
ii  libsystemd0            247.3-3
ii  lsb-base               11.1.0

Versions of packages openvpn recommends:
ii  easy-rsa  3.0.8-1

Versions of packages openvpn suggests:
ii  openssl                   1.1.1k-1
pn  openvpn-systemd-resolved  <none>
pn  resolvconf                <none>

-- debconf information:

Reply via email to