Your message dated Thu, 22 Jun 2023 11:07:20 +
with message-id
and subject line Bug#865167: fixed in ijs 0.35-15.1
has caused the Debian Bug report #865167,
regarding ijs: please build-depend on automake, not obsolete automake1.11
to be marked as done.
This means that you claim that the probl
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 12 Jun 2023 11:51:51 +0200
Source: ijs
Architecture: source
Version: 0.35-15.1
Distribution: unstable
Urgency: medium
Maintainer: Debian Printing Team
Changed-By: Bastia
Source: cups
Version: 2.4.2-4
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Hi,
The following vulnerability was published for cups.
CVE-2023-34241[0]:
| use-after-free in cupsdAcceptClient()
If you fix the vulnerability please also make sure to
cups_2.4.2-5_source.changes uploaded successfully to localhost
along with the files:
cups_2.4.2-5.dsc
cups_2.4.2-5.debian.tar.xz
cups_2.4.2-5_amd64.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Your message dated Thu, 22 Jun 2023 22:10:19 +
with message-id
and subject line Bug#1038885: fixed in cups 2.4.2-5
has caused the Debian Bug report #1038885,
regarding cups: CVE-2023-34241: use-after-free in cupsdAcceptClient()
to be marked as done.
This means that you claim that the problem
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 21 Jun 2023 22:30:27 +0200
Source: cups
Architecture: source
Version: 2.4.2-5
Distribution: unstable
Urgency: medium
Maintainer: Debian Printing Team
Changed-By: Thorste