Your message dated Wed, 08 Jan 2014 15:04:47 +0100 with message-id <52cd5aff.2070...@gambaru.de> and subject line jenkins: CVE-2013-6372 CVE-2013-6373 CVE-2013-6374 has caused the Debian Bug report #730457, regarding jenkins: CVE-2013-6372 CVE-2013-6373 CVE-2013-6374 to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 730457: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730457 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Package: jenkins Severity: grave Tags: security Justification: user security hole Please see https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-11-20 for references and patches. Cheers, Moritz
--- End Message ---
--- Begin Message ---> Hi Moritz > > Looking at the upstream security advisory, these issues impact plugins > that are not packaged either in jenkins or separately in Debian. > > I think this bug can be closed out. > > Cheers > > James I agree with James here. Those plugins are not shipped with Debian thus this security advisory does not affect us. I'm closing this bug report now. Regards, Markussignature.asc
Description: OpenPGP digital signature
--- End Message ---
__ This is the maintainer address of Debian's Java team <http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-java-maintainers>. Please use debian-j...@lists.debian.org for discussions and questions.