Le jeudi, 13 octobre 2016, 10.03:44 h CEST Emilio Pozuelo Monfort a écrit :
> You probably wanted to send this to team@security or debian-security@ ?
>
> If you want this to go through stable (pu) rather than stable-security,
> please file a pu bug against release.debian.org.
Right; thanks. I'll
pu bug against release.debian.org.
Cheers,
Emilio
> Original Message
> Subject: Bug#839226: [PATCH] cups : SSL is vulnerable to POODLE [Jessie]
> Date: 2016-10-10 10:13
> From: Didier 'OdyX' Raboud
> To: 839...@bugs.debian.org, debian-release@lists.de
Re-sending differently, as somehow my MUA messed this sending in some
weird way.
Original Message
Subject: Bug#839226: [PATCH] cups : SSL is vulnerable to POODLE
[Jessie]
Date: 2016-10-10 10:13
From: Didier 'OdyX' Raboud
To: 839...@bugs.debian.org, debi
Hi Didier,
> Have we removed protocols' support in {old,}stable before?.
We have done that on a case-by-case basis via point updates in the past,
seems also fine here.
Cheers,
Moritz
Version: 2.0.2-1
Hi Frederic, hi Stable & LTS teams,
Frederic's suggestion is to patch CUPS to disable SSLv3 and RC4 algorithms to
protect CUPS from the POODLE vulnerability.
Have we removed protocols' support in {old,}stable before? Ubuntu applied
this patch in Ubuntu Trusty, and RedHat did
5 matches
Mail list logo