Your message dated Wed, 08 Jan 2014 15:04:47 +0100
with message-id <52cd5aff.2070...@gambaru.de>
and subject line jenkins: CVE-2013-6372 CVE-2013-6373 CVE-2013-6374
has caused the Debian Bug report #730457,
regarding jenkins: CVE-2013-6372 CVE-2013-6373 CVE-2013-6374
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
730457: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730457
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: jenkins
Severity: grave
Tags: security
Justification: user security hole

Please see 
https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-11-20
 for
references and patches.

Cheers,
        Moritz

--- End Message ---
--- Begin Message ---
> Hi Moritz
> 
> Looking at the upstream security advisory, these issues impact plugins
> that are not packaged either in jenkins or separately in Debian.
> 
> I think this bug can be closed out.
> 
> Cheers
> 
> James

I agree with James here. Those plugins are not shipped with Debian thus
this security advisory does not affect us.

I'm closing this bug report now.

Regards,

Markus

Attachment: signature.asc
Description: OpenPGP digital signature


--- End Message ---
__
This is the maintainer address of Debian's Java team
<http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-java-maintainers>. 
Please use
debian-j...@lists.debian.org for discussions and questions.

Reply via email to