Hi Moritz,
On Thu, 2021-03-18 at 20:17 +0100, Moritz Mühlenhoff wrote:
> Am Sat, Mar 13, 2021 at 06:46:38PM + schrieb Adam D. Barratt:
> > On Fri, 2021-02-26 at 16:30 +0100, Moritz Muehlenhoff wrote:
> > > On Fri, Feb 26, 2021 at 07:49:38AM +0100, Matthias Klose wrote:
> > > > On 2/25/21 7:41
Am Sat, Mar 13, 2021 at 06:46:38PM + schrieb Adam D. Barratt:
> On Fri, 2021-02-26 at 16:30 +0100, Moritz Muehlenhoff wrote:
> > On Fri, Feb 26, 2021 at 07:49:38AM +0100, Matthias Klose wrote:
> > > On 2/25/21 7:41 PM, Moritz Muehlenhoff wrote:
> > > > + * CVE-2021-3177
> > >
> > > are all
On Fri, 2021-02-26 at 16:30 +0100, Moritz Muehlenhoff wrote:
> On Fri, Feb 26, 2021 at 07:49:38AM +0100, Matthias Klose wrote:
> > On 2/25/21 7:41 PM, Moritz Muehlenhoff wrote:
> > > + * CVE-2021-3177
> >
> > are all the ctypes tests passing with this patch? See #983516.
>
> I'll have a look at
On Fri, Feb 26, 2021 at 07:49:38AM +0100, Matthias Klose wrote:
> On 2/25/21 7:41 PM, Moritz Muehlenhoff wrote:
> > + * CVE-2021-3177
>
> are all the ctypes tests passing with this patch? See #983516.
I'll have a look at Marc' updated patch and revise if needed.
Cheers,
Moritz
On 2/25/21 7:41 PM, Moritz Muehlenhoff wrote:
> + * CVE-2021-3177
are all the ctypes tests passing with this patch? See #983516.
Matthias
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
X-Debbugs-Cc: d...@debian.org
debdiff below fixes three security issues, which don't warrant a DSA by itself.
Update has been tested on a Buster few systems (and verified with the
6 matches
Mail list logo