On Sun, May 10, 2015 at 09:12:43PM +0100, Steven Chamberlain wrote:
Dear Security Team,
This bug was reopened because the original fix from upstream was found
to be incomplete.
Please may I upload to wheezy-security with the attached debdiff,
replacing the CVE-2015-1414 patch with the new
Dear Security Team,
This bug was reopened because the original fix from upstream was found
to be incomplete.
Please may I upload to wheezy-security with the attached debdiff,
replacing the CVE-2015-1414 patch with the new one, and also patching
CVE-2015-2923 (Debian Bug #782735).
I've been
Moritz Mühlenhoff j...@inutil.org writes:
For kfreebsd-8 we've skipped previous updates, since it was
said -8 were mostly a test kernel. So I don't think it
makes sense to start with it now? Or did I miss something?
You're right. -9 should be on the way.
Christoph
signature.asc
On Wed, Feb 25, 2015 at 02:27:47PM +0100, Christoph Egger wrote:
Hi!
I would like to upload to stable security for this kernel crash / DoS
vulnerability. Patch for -8 is below, -9 is the same modulo version
numbers.
Please upload for kfreebsd-9.
For kfreebsd-8 we've skipped previous
4 matches
Mail list logo