On 2019-12-31 12:49, Hilmar Preuße wrote:
Am 30.12.2019 um 22:23 teilte Adam D. Barratt mit:
Control: tags -1 + confirmed
+ * Cherry pick patch from upstream:
+ - for upstream 861 (CVE-2019-19269) (Closes: #946345)
+ - for upstream 859 (CVE-2019-19270) (Closes: #946346)
+ upstrea
Am 30.12.2019 um 22:23 teilte Adam D. Barratt mit:
> Control: tags -1 + confirmed
> + * Cherry pick patch from upstream:
> + - for upstream 861 (CVE-2019-19269) (Closes: #946345)
> + - for upstream 859 (CVE-2019-19270) (Closes: #946346)
> + upstream_pull_859_861_CVE-2019-19270_CVE-20
Processing control commands:
> tags -1 + confirmed
Bug #946559 [release.debian.org] buster-pu: package proftpd-dfsg/1.3.6-4+deb10u3
Added tag(s) confirmed.
--
946559: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946559
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 + confirmed
On Tue, 2019-12-10 at 23:48 +0100, Hilmar Preusse wrote:
> te attached debdiff fixes the issues
>
> #946345 proftpd-dfsg: CVE-2019-19269
> #946346 proftpd-dfsg: CVE-2019-19270
>
> ...for Debian buster. I built/installed the package an Debian stable
> and could login
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
Hello,
te attached debdiff fixes the issues
#946345 proftpd-dfsg: CVE-2019-19269
#946346 proftpd-dfsg: CVE-2019-19270
...for Debian buster. I built/installed the package an Debian
5 matches
Mail list logo