Hi Aurelien,
On Wednesday, 8 September 2021 21:56:51 CEST you wrote:
> On 2021-09-08 13:25, Jonas Andradas wrote:
> > Hi,
> >
> > On Sat, 21 Aug 2021 20:14:52 +0200 Aurelien Jarno
> >
> > wrote:
> > > Version: 2.32-0experimental0
> > >
> > > On 2021-05-26 21:57, Salvatore Bonaccorso wrote:
>
On 2021-09-08 13:25, Jonas Andradas wrote:
> Hi,
>
> On Sat, 21 Aug 2021 20:14:52 +0200 Aurelien Jarno
> wrote:
> > Version: 2.32-0experimental0
> >
> > On 2021-05-26 21:57, Salvatore Bonaccorso wrote:
> > > Source: glibc
> > > Version: 2.31-12
> > > Severity: important
> > > Tags: security
Hi,
On Sat, 21 Aug 2021 20:14:52 +0200 Aurelien Jarno
wrote:
> Version: 2.32-0experimental0
>
> On 2021-05-26 21:57, Salvatore Bonaccorso wrote:
> > Source: glibc
> > Version: 2.31-12
> > Severity: important
> > Tags: security upstream
> > Forwarded:
Hi,
Anybody knows when will this be patched in buster (glibc 2.28)?
Thanks,
Liming
On Wed, 26 May 2021 21:57:12 +0200 Salvatore Bonaccorso
mailto:car...@debian.org>> wrote:
> Source: glibc
> Version: 2.31-12
> Severity: important
> Tags: security upstream
> Forwarded:
Source: glibc
Version: 2.31-12
Severity: important
Tags: security upstream
Forwarded: https://sourceware.org/bugzilla/show_bug.cgi?id=27896
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Hi,
The following vulnerability was published for glibc, basically purely
to track the upstream issue
5 matches
Mail list logo