On Mon, Jul 01, 2019 at 02:17:45PM -0400, Cindy Sue Causey wrote:
> For newbies peeking in, every single one of those 91 incoming
> *upgraded* packages is OVERWRITING... OBLITERATING.. the otherwise
> stable packages that Developers manually tweaked especially for one's
> currently installed Debia
On 7/1/19, Greg Wooledge wrote:
> On Mon, Jul 01, 2019 at 12:13:00PM +0200, Rodrigo Olmos wrote:
>> > For security critical packages like web browsers I would always
>> > recommend getting a newer version from unstable or from stable-security
>> > ASAP.
>>
>> What would be the best procedure as of
On Mon, Jul 01, 2019 at 12:13:00PM +0200, Rodrigo Olmos wrote:
> > For security critical packages like web browsers I would always recommend
> > getting a newer version from unstable or from stable-security ASAP.
>
> What would be the best procedure as of today to have v75 instead of
> v73 on str
> For security critical packages like web browsers I would always recommend
> getting a newer version from unstable or from stable-security ASAP.
What would be the best procedure as of today to have v75 instead of
v73 on stretch? I tried pinning v75 from unstable but it suggests huge
changes (91
On Thu, 20 Jun 2019 at 17:57, Lazar Tadić wrote:
> Chromium is currently 2 major and 3 minor versions behind upstream in
> both Stretch and Buster. Please consider uploading a recent version to
> address 34 open security issues, before the complete freeze on 25th of
> June.
>
I have recently ins
> Oh, and please excuse me for my poor use of these mailing
> lists, I'm new here.
I apologize myself if I've make you feel a bit uncomfortable.
I'm not a native English speaker, and sometimes my wording may
happen to be a little bit stronger than first intended, but I
try to watch my tongue. Bla
> Thank you for your note. I do /not/ speak for the Debian kernel
> team, but an upgrade of Linux fixing these TCP SACK
> vulnerabilities are in the pipeline in Debian Sid, in Linux
> version 4.19.37-5. There is an unconditional ten days delay for
> introduction of upgrades from Sid to Testing,
On 2019-06-20 14:48 -0400, Greg Wooledge wrote:
> On Thu, Jun 20, 2019 at 08:45:51PM +0200, Étienne Mollier wrote:
>> There is an unconditional ten days delay for
>> introduction of upgrades from Sid to Testing, hence the missing
>> security upgrade into Debian Buster at t time. Hopefully it
>> s
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 6/20/19 8:48 PM, Greg Wooledge wrote:
> On Thu, Jun 20, 2019 at 08:45:51PM +0200, Étienne Mollier wrote:
>> There is an unconditional ten days delay for introduction of upgrades from
>> Sid to Testing, hence the missing security upgrade into Debi
On Thu, Jun 20, 2019 at 08:45:51PM +0200, Étienne Mollier wrote:
> There is an unconditional ten days delay for
> introduction of upgrades from Sid to Testing, hence the missing
> security upgrade into Debian Buster at t time. Hopefully it
> should land on time for July, the 6th.
The delay period
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 6/20/19 6:40 PM, Lazar Tadić wrote:
> Likewise, linux package in Buster lack recent fixes for SACKs Panic
> vulnerabilities. I hope it will also be uploaded soon.
Good Day Lazar,
Thank you for your note. I do /not/ speak for the Debian kernel
11 matches
Mail list logo