Your message dated Sun, 08 Dec 2019 19:20:15 +0000
with message-id <[email protected]>
and subject line Bug#944686: fixed in spectre-meltdown-checker 0.43-1
has caused the Debian Bug report #944686,
regarding spectre-meltdown-checker: support for new TAA CVE-2019-11135
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
944686: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944686
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: spectre-meltdown-checker
Version: 0.42-2
Severity: wishlist

It looks like upstream added some changes for the new TAA vulnerability
CVE-2019-11135, made some other fixes since 0.42, updated the mcedb,
etc. but hasn't yet issued a new release. It looks like maybe they are
still working on solving #314 first?

Anyway hopefully a new upstream is coming soon and it would be good to
make available for stretch/buster.

Thanks,

-- 
Matt Taggart
[email protected]

--- End Message ---
--- Begin Message ---
Source: spectre-meltdown-checker
Source-Version: 0.43-1

We believe that the bug you reported is fixed in the latest version of
spectre-meltdown-checker, which is due to be installed in the Debian FTP 
archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sylvestre Ledru <[email protected]> (supplier of updated 
spectre-meltdown-checker package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sun, 08 Dec 2019 19:49:45 +0100
Source: spectre-meltdown-checker
Architecture: source
Version: 0.43-1
Distribution: unstable
Urgency: medium
Maintainer: Sylvestre Ledru <[email protected]>
Changed-By: Sylvestre Ledru <[email protected]>
Closes: 944686
Changes:
 spectre-meltdown-checker (0.43-1) unstable; urgency=medium
 .
   [ Holger Levsen ]
   * d/control: bump standards version to 4.4.1, no changes needed.
 .
   [ Sylvestre Ledru ]
   * new upstream release (Closes: #944686)
   * Remove empty debian/patches/series.
   * Set upstream metadata fields: Repository, Repository-Browse.
Checksums-Sha1:
 90c3b0411d6c7df40be2fdf838746a36063a1bf5 2066 
spectre-meltdown-checker_0.43-1.dsc
 81182932657e69e60b6dc0846e691d8764cc0843 51651 
spectre-meltdown-checker_0.43.orig.tar.gz
 c545b0a89c635f4ae309d1c1564fac49dfd79476 2416 
spectre-meltdown-checker_0.43-1.debian.tar.xz
 9114e4249afd33fdc51e9186fa6b2323cfe3713f 5573 
spectre-meltdown-checker_0.43-1_amd64.buildinfo
Checksums-Sha256:
 a66ff823c75b3eb3323e0306ffc3844d8be2b5677c2b4d9f018c4d9cd7418bd1 2066 
spectre-meltdown-checker_0.43-1.dsc
 b913f08e8380403c30f20e2c8763010db81a89cb2c5474ae54df1419644ad185 51651 
spectre-meltdown-checker_0.43.orig.tar.gz
 c2489d92c9d54fac4beb2c6199febb68c08315d5f925bf287fc4dbc0d0a43a04 2416 
spectre-meltdown-checker_0.43-1.debian.tar.xz
 6a3fd1a02ea5a44b9846610f2cf6cefca0938ce600c8ee192bfb1be1ff33951b 5573 
spectre-meltdown-checker_0.43-1_amd64.buildinfo
Files:
 6fda3126ac2b8b207c84c17f7d88cecf 2066 kernel optional 
spectre-meltdown-checker_0.43-1.dsc
 05cd2e53edbdcccfc072a66fafa4ea38 51651 kernel optional 
spectre-meltdown-checker_0.43.orig.tar.gz
 6a80cb574c7dd7133d906f915d10383e 2416 kernel optional 
spectre-meltdown-checker_0.43-1.debian.tar.xz
 6c6b3b94e88adc004f84d4cd4c63c3ff 5573 kernel optional 
spectre-meltdown-checker_0.43-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=ebdV
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to