Am 30.12.2019 um 22:21 teilte Adam D. Barratt mit:
> Control: tags -1 + confirmed
> The distribution for a stretch-pu upload should simply be "stretch".
>
> + * Cherry pick patch from upstream:
> + - for upstream 861 (CVE-2019-19269) (Closes: #946345)
> + upstream_pull_861_CVE-2019-192
Hi,
On Mon, 2019-12-30 at 23:27 +0100, Hilmar Preuße wrote:
> Am 30.12.2019 um 22:21 teilte Adam D. Barratt mit:
> > On Tue, 2019-12-10 at 23:51 +0100, Hilmar Preusse wrote:
[...]
> > + * Cherry pick patch from upstream:
> > + - for upstream 861 (CVE-2019-19269) (Closes: #946345)
> > + u
Am 30.12.2019 um 22:21 teilte Adam D. Barratt mit:
> On Tue, 2019-12-10 at 23:51 +0100, Hilmar Preusse wrote:
Hi Adam,
>> #946345 proftpd-dfsg: CVE-2019-19269
>>
>> ...for Debian stretch. I built/installed the package an Debian
>> oldstable and could login into the server and transfer file.
>
>
Processing control commands:
> tags -1 + confirmed
Bug #946560 [release.debian.org] stretch-pu: package
proftpd-dfsg/1.3.5b-4+deb9u3
Added tag(s) confirmed.
--
946560: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946560
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 + confirmed
On Tue, 2019-12-10 at 23:51 +0100, Hilmar Preusse wrote:
> te attached debdiff fixes the issues
>
> #946345 proftpd-dfsg: CVE-2019-19269
>
> ...for Debian stretch. I built/installed the package an Debian
> oldstable and could login into the server and transfer file.
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu
Hello,
te attached debdiff fixes the issues
#946345 proftpd-dfsg: CVE-2019-19269
...for Debian stretch. I built/installed the package an Debian oldstable
and could login into the
6 matches
Mail list logo