Hi Rob,
On August 20, 2019 at 7:59PM +0900, tats (at debian.org) wrote:
>> Upstream commit e87e6a24c4 contains the fix, which should get backported to
>> buster due to the bug severity.
>
> Instead, a small patch is available in the emacs-26 branch:
>
> -
>
Tatsuya Kinoshita writes:
Anyway, this bug will be fixed in the Emacs 26.3 release.
Is there any chance of that getting included in 10.1 or 10.2? I
was hoping one of the upcoming bugfix releases might get a new
Emacs with the fix included.
I’m aware of the workarounds, but I think
Control: reassign 934314 src:emacs 1:26.1+1-3.2
Control: forcemerge 922659 934314
Control: severity 922659 important
On August 9, 2019 at 8:32AM -0700, ian (at retrospec.tv) wrote:
> Known workarounds involve disabling GnuTLS support or TLS 1.3, both of which
> are inadvisable from a security
Package: emacs
Version: 1:26.1+1-3.2
Severity: grave
Tags: upstream
The version of Emacs shipped in buster has a bug which causes synchronous HTTPS
requests to fail due to a GnuTLS race condition. It’s been reported and fixed
upstream: https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34341
Known
4 matches
Mail list logo