-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 29 Sep 2022 02:47:06 +0200
Source: linux
Architecture: source
Version: 4.19.260-1
Distribution: buster-security
Urgency: high
Maintainer: Debian Kernel Team
Changed-By: Ben Hutchings
Closes: 1018752
Changes:
linux
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 30 Sep 2022 06:08:49 +0530
Source: gdal
Architecture: source
Version: 2.4.0+dfsg-1+deb10u1
Distribution: buster-security
Urgency: high
Maintainer: Debian GIS Project
Changed-By: Utkarsh Gupta
Changes:
gdal
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 30 Sep 2022 05:43:40 +0530
Source: node-thenify
Architecture: source
Version: 3.3.0-1+deb10u1
Distribution: buster-security
Urgency: high
Maintainer: Debian Javascript Maintainers
Changed-By: Utkarsh Gupta
Changes:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 30 Sep 2022 00:47:24 +0200
Source: linux-latest
Architecture: source
Version: 105+deb10u17
Distribution: buster-security
Urgency: medium
Maintainer: Debian Kernel Team
Changed-By: Ben Hutchings
Changes:
linux-latest
Hi,
On 29/09/2022 09:09, Emilio Pozuelo Monfort wrote:
On 28/09/2022 23:54, Ola Lundqvist wrote:
Took me a month to get down here in the email backlog. I think your
reasoning makes sense.
I have added the following to the LTS/Development page.
"If a CVE has been fixed in Debian Stable it
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian LTS Advisory DLA-3126-1debian-...@lists.debian.org
https://www.debian.org/lts/security/Thorsten Alteholz
September 30, 2022
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian LTS Advisory DLA-3125-1debian-...@lists.debian.org
https://www.debian.org/lts/security/Thorsten Alteholz
September 30, 2022
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 29 Sep 2022 19:03:02 +0200
Source: libsndfile
Architecture: source
Version: 1.0.28-6+deb10u2
Distribution: buster-security
Urgency: high
Maintainer: Debian Multimedia Maintainers
Changed-By: Thorsten Alteholz
Changes:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 26 Sep 2022 22:03:02 +0200
Source: libvncserver
Architecture: source
Version: 0.9.11+dfsg-1.3+deb10u5
Distribution: buster-security
Urgency: high
Maintainer: Peter Spiess-Knafl
Changed-By: Thorsten Alteholz
Changes:
On Thu, Sep 29, 2022 at 09:09:29AM +0200, Emilio Pozuelo Monfort wrote:
> On 28/09/2022 23:54, Ola Lundqvist wrote:
> > Hi Sylvain
> >
> > Took me a month to get down here in the email backlog. I think your
> > reasoning makes sense.
> > I have added the following to the LTS/Development page.
> >
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
- -
Debian LTS Advisory DLA-3124-1debian-...@lists.debian.org
https://www.debian.org/lts/security/ Emilio Pozuelo Monfort
September 28, 2022
On 28/09/2022 23:54, Ola Lundqvist wrote:
Hi Sylvain
Took me a month to get down here in the email backlog. I think your
reasoning makes sense.
I have added the following to the LTS/Development page.
"If a CVE has been fixed in Debian Stable it should, in general, be fixed
in LTS as well, or
12 matches
Mail list logo