Your message dated Sat, 19 Aug 2023 09:08:19 +0000
with message-id <e1qxhwr-00gwci...@fasolo.debian.org>
and subject line Bug#1042550: fixed in spectre-meltdown-checker 0.46-1
has caused the Debian Bug report #1042550,
regarding spectre-meltdown-checker: Update to 0.46 upstream to support Zenbleed
detection
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
1042550: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1042550
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: spectre-meltdown-checker
Version: 0.45-2
Severity: wishlist
X-Debbugs-Cc: car...@debian.org
Hi
The new 0.46 upstream adds:
feat: detect the vulnerability and mitigation of Zenbleed (CVE-2023-20593)
in particular. Can you update the package to the new upstream version?
(Might it be an option to put the update as well in the next point
releases rebasing to the 0.46 based version?)
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: spectre-meltdown-checker
Source-Version: 0.46-1
Done: Sylvestre Ledru <sylves...@debian.org>
We believe that the bug you reported is fixed in the latest version of
spectre-meltdown-checker, which is due to be installed in the Debian FTP
archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1042...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Sylvestre Ledru <sylves...@debian.org> (supplier of updated
spectre-meltdown-checker package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Sat, 19 Aug 2023 10:41:52 +0200
Source: spectre-meltdown-checker
Architecture: source
Version: 0.46-1
Distribution: unstable
Urgency: medium
Maintainer: Sylvestre Ledru <sylves...@debian.org>
Changed-By: Sylvestre Ledru <sylves...@debian.org>
Closes: 1042550
Changes:
spectre-meltdown-checker (0.46-1) unstable; urgency=medium
.
* New upstream release (Closes: #1042550)
Checksums-Sha1:
df20ea2df8ad6ebbcac52048ed6e16c38105b2c2 2066
spectre-meltdown-checker_0.46-1.dsc
6eb8b74efc064aa0a72dad6cdddc979bd5e15986 67595
spectre-meltdown-checker_0.46.orig.tar.gz
1ebd01db4d1b1a860d058f762ecdb7699308ca21 2668
spectre-meltdown-checker_0.46-1.debian.tar.xz
30710c4c33eb373a6c9bde16f6530a50e2386efd 5750
spectre-meltdown-checker_0.46-1_amd64.buildinfo
Checksums-Sha256:
21cf60561c7baace520a7c08eee95100b98b612bb92f853d6d83c6e5ebf649ed 2066
spectre-meltdown-checker_0.46-1.dsc
3aad74e13db23da34c248f99fd87e9b193e00aad2b68bc9f578ce0241cb9db7f 67595
spectre-meltdown-checker_0.46.orig.tar.gz
454a070a60f87100e44308832210754d773050d23495caf6cfee057647f9c827 2668
spectre-meltdown-checker_0.46-1.debian.tar.xz
7d37879d427c8deb23e0d1e6c49143a4878c00946df3e6603d28233324fb8233 5750
spectre-meltdown-checker_0.46-1_amd64.buildinfo
Files:
ffb19cff2ac6d5f7b5fc949d10533b0f 2066 kernel optional
spectre-meltdown-checker_0.46-1.dsc
bceaff314690f809e98218adc52f9dde 67595 kernel optional
spectre-meltdown-checker_0.46.orig.tar.gz
f5b922c8e7b090d9a0a87ca817d4f6cd 2668 kernel optional
spectre-meltdown-checker_0.46-1.debian.tar.xz
cb3429f15baf28537b7c998e42f5e0bc 5750 kernel optional
spectre-meltdown-checker_0.46-1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=srof
-----END PGP SIGNATURE-----
--- End Message ---