Hi Adam,
> Anton, do you have any idea how widespread use of the existing stretch-
> backports package has been?
No, I do not have this information. If you are not sure - feel free to
reject this request.
Best regards
Anton
Am Do., 2. Juli 2020 um 22:14 Uhr schrieb Adam D. Barratt <
a...@adam
Apologies for letting this sit for a while.
On Mon, 2020-03-23 at 18:08 -0300, Henrique de Moraes Holschuh wrote:
> On Sat, 21 Mar 2020, Adam D. Barratt wrote:
> > On Sun, 2020-03-15 at 21:37 +0100, Anton Gladky wrote:
> > > I have prepared an update for amd64-microcode for Debian Stretch,
> > > w
On Sat, 21 Mar 2020, Adam D. Barratt wrote:
> On Sun, 2020-03-15 at 21:37 +0100, Anton Gladky wrote:
> > I have prepared an update for amd64-microcode for Debian Stretch,
> > which fixes CVE-2017-5715. Please see an attached debdiff.
> >
> > This is the newer upstream version, which fixes CVE-2017
Hi Henrique,
On Sun, 2020-03-15 at 21:37 +0100, Anton Gladky wrote:
> I have prepared an update for amd64-microcode for Debian Stretch,
> which fixes CVE-2017-5715. Please see an attached debdiff.
>
> This is the newer upstream version, which fixes CVE-2017-5715.
> Security team marked this CVE f
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Dear release team,
I have prepared an update for amd64-microcode for Debian Stretch, which
fixes CVE-2017-5715. Please see an atta
5 matches
Mail list logo