Your message dated Sat, 10 Feb 2024 13:11:21 +0000 with message-id <e1ryn8b-002ybf...@coccia.debian.org> and subject line Released with 12.5 has caused the Debian Bug report #1060767, regarding bookworm-pu: package proftpd-mod-proxy/0.9.2-1+deb12u1 to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1060767: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1060767 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Package: release.debian.org Severity: normal Tags: bookworm User: release.debian....@packages.debian.org Usertags: pu X-Debbugs-Cc: proftpd-mod-pr...@packages.debian.org Control: affects -1 + src:proftpd-mod-proxy [ Reason ] The version currently in Debian stable suffers from the CVE-2023-48795 (Terrapin attack) security issue. [ Impact ] Proftp further suffers from the described security issues. [ Tests ] The current change is directly copied from the upstream git repo. They have a test suite for that package, it is not yet activated in Debian. [ Checklist ] [X] *all* changes are documented in the d/changelog [X] I reviewed all changes and I approve them [X] attach debdiff against the package in (old)stable [X] the issue is verified as fixed in unstable [ Changes ] Patch for CVE-2023-48795 (copied from upstream's repo) [ Other info ] The debdiff is available here: https://release.debian.org/proposed-updates/bookworm_diffs/proftpd-mod-proxy_0.9.2-1+deb12u1.debdiff
signature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---Version: 12.5 The upload requested in this bug has been released as part of 12.5.
--- End Message ---