Your message dated Sat, 29 Jun 2024 10:46:21 +0000
with message-id <e1snvb3-002bkr...@coccia.debian.org>
and subject line Released with 12.6
has caused the Debian Bug report #1073967,
regarding bookworm-pu: package jose/11-2+deb12u1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1073967: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1073967
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
Tags: bookworm
X-Debbugs-Cc: j...@packages.debian.org, debian.a...@manchmal.in-ulm.de
Control: affects -1 + src:jose
User: release.debian....@packages.debian.org
Usertags: pu

[ Note: Same text as for the bullseye upload ]

[ Reason ]
"Fix potential DoS issue with p2c header" [CVE-2023-50967]

[ Impact ]
Users become susceptible for a DoS attack.

[ Tests ]
Upstream enhanced the test suite accordingly, this is included
in this upload.

[ Risks ]
The fix is rather simple so there shouldn't be any risks.

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable (13-1, uploaded 2024-04-04)

[ Changes ]
Just cherry-pick the fix from upstream. The DEP-3 header has all
the details.

[ Other info ]
Fix via SPU after coordination with the Debian security team.

Regards,

    Christoph

Attachment: signature.asc
Description: PGP signature


--- End Message ---
--- Begin Message ---
Version: 12.6

The upload requested in this bug has been released as part of 12.6.

--- End Message ---

Reply via email to