Hi,
On Fri, May 19, 2023 at 04:19:20PM -0400, Chris Frey wrote:
> Severity: grave
>
> Updating severity as suggested on the debian-lts mailing list.
Leaving the severity judgement to Michael. I have as well merged
your bug with the #982300 one.
>
> Do you think this bug warrants a security-rela
Severity: grave
Updating severity as suggested on the debian-lts mailing list.
Do you think this bug warrants a security-related fix in stable,
due to the potential for data corruption?
Thanks,
- Chris
[1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035537
Control: fixed -1 9.1-1
Hi,
On Thu, May 04, 2023 at 10:55:59PM -0400, Chris Frey wrote:
> Package: coreutils
> Version: 8.32-4+b1
>
> This bug exists in both Debian Buster and Debian Bullseye.
>
> It has been fixed in upstream.
>
> It can be reproduced by splitting a file such that size of eac
Package: coreutils
Version: 8.32-4+b1
This bug exists in both Debian Buster and Debian Bullseye.
It has been fixed in upstream.
It can be reproduced by splitting a file such that size of each
chunk produced by split is larger than the block size used to read
the files (io_blksize(), bufsize, in
4 matches
Mail list logo