Hi Craig,
On Thu, Jan 28, 2021 at 09:00:02PM +1100, Craig Small wrote:
> I missed this. I'm uploading now although with the freeze it might not
> matter anyway.
Perfect timing ;-). The window for the next point release for buster
(10.8) will close upcoming weekend, so good if we can have the fix
I missed this. I'm uploading now although with the freeze it might not
matter anyway.
- Craig
On Thu, 24 Dec 2020 at 16:52, Salvatore Bonaccorso
wrote:
> Hi Craig,
>
> On Sun, Nov 22, 2020 at 07:09:29PM +, Adam D. Barratt wrote:
> > Control: tags -1 + confirmed
> >
> > On Tue, 2020-10-13
Hi Craig,
On Sun, Nov 22, 2020 at 07:09:29PM +, Adam D. Barratt wrote:
> Control: tags -1 + confirmed
>
> On Tue, 2020-10-13 at 21:30 +1100, Craig Small wrote:
> > The security release in deb10u1 made EXTEND-MIB read-only
> > to close a security hole (CVE-2020-15862/Bug #9651166)
> > However
Processing control commands:
> tags -1 + confirmed
Bug #972149 [release.debian.org] buster-pu: package
net-snmp/5.7.3+dfsg-5+deb10u1
Added tag(s) confirmed.
--
972149: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972149
Debian Bug Tracking System
Contact ow...@bugs.debian.org with
Control: tags -1 + confirmed
On Tue, 2020-10-13 at 21:30 +1100, Craig Small wrote:
> The security release in deb10u1 made EXTEND-MIB read-only
> to close a security hole (CVE-2020-15862/Bug #9651166)
> However this meant the cacheTime and execType could not be
> changed which caused problems with
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
[ Reason ]
The security release in deb10u1 made EXTEND-MIB read-only
to close a security hole (CVE-2020-15862/Bug #9651166)
However
6 matches
Mail list logo