Your message dated Sat, 18 Jul 2020 13:07:00 +0100 with message-id <b8d89cdfeeda7b6d1ef96a8706a20f9525c2151b.camel@adam-barratt.org.uk> and subject line Closing requests for fixes included in 9.13 point release has caused the Debian Bug report #963703, regarding stretch-pu: package gnutls28/3.5.8-5+deb9u5 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 963703: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963703 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: stretch-pu: package gnutls28/3.5.8-5+deb9u5
- From: Andreas Metzler <ametzler@bebt.de>
- Date: Thu, 25 Jun 2020 17:37:29 +0200
- Message-id: <20200625153729.GA197447@argenau.bebt.de>
Package: release.debian.org Severity: normal Tags: stretch User: release.debian.org@packages.debian.org Usertags: pu Hello, I would like to make a last bugfix upload to stretch: * Pull fixes for CVE-2019-3836 / [GNUTLS-SA-2019-03-27, #694]. + 40_casts_related_to_fix_CVE-2019-3829.patch + 40_rel3.6.7_01-Automatically-NULLify-after-gnutls_free.patch + 40_rel3.6.7_01-fuzz-added-fuzzer-for-certificate-verification.patch + 41_use_datefudge_to_trigger_CVE-2019-3829_testcase.diff * More important fixes: + 43_rel3.6.14_10-session_pack-fix-leak-in-error-path.patch [One-line-fix for memleak] + 44_rel3.6.14_10-Update-session_ticket.c-to-add-support-for-zero-leng.patch Handle zero length session tickets, fixing connection errors on TLS1.2 sessions to some big hosting providers. (See LP 1876286) [Fixes connections to e.g. verizon popserver.] TIA, cu Andreas
--- End Message ---
--- Begin Message ---
- To: 881871-done@bugs.debian.org, 891657-done@bugs.debian.org, 892932-done@bugs.debian.org, 893439-done@bugs.debian.org, 893548-done@bugs.debian.org, 898006-done@bugs.debian.org, 912531-done@bugs.debian.org, 921319-done@bugs.debian.org, 927433-done@bugs.debian.org, 930374-done@bugs.debian.org, 935739-done@bugs.debian.org, 944228-done@bugs.debian.org, 948650-done@bugs.debian.org, 948651-done@bugs.debian.org, 948653-done@bugs.debian.org, 948678-done@bugs.debian.org, 949112-done@bugs.debian.org, 949367-done@bugs.debian.org, 949925-done@bugs.debian.org, 951564-done@bugs.debian.org, 951872-done@bugs.debian.org, 953123-done@bugs.debian.org, 953745-done@bugs.debian.org, 954664-done@bugs.debian.org, 954863-done@bugs.debian.org, 955394-done@bugs.debian.org, 955409-done@bugs.debian.org, 955861-done@bugs.debian.org, 956532-done@bugs.debian.org, 956534-done@bugs.debian.org, 956537-done@bugs.debian.org, 956805-done@bugs.debian.org, 956929-done@bugs.debian.org, 958192-done@bugs.debian.org, 958850-done@bugs.debian.org, 958953-done@bugs.debian.org, 958995-done@bugs.debian.org, 961020-done@bugs.debian.org, 961440-done@bugs.debian.org, 961442-done@bugs.debian.org, 961579-done@bugs.debian.org, 961804-done@bugs.debian.org, 961922-done@bugs.debian.org, 961937-done@bugs.debian.org, 961945-done@bugs.debian.org, 962068-done@bugs.debian.org, 962155-done@bugs.debian.org, 962234-done@bugs.debian.org, 962256-done@bugs.debian.org, 962264-done@bugs.debian.org, 963614-done@bugs.debian.org, 963693-done@bugs.debian.org, 963703-done@bugs.debian.org, 963942-done@bugs.debian.org, 964244-done@bugs.debian.org, 964291-done@bugs.debian.org, 964325-done@bugs.debian.org, 964340-done@bugs.debian.org, 964351-done@bugs.debian.org, 964398-done@bugs.debian.org, 964411-done@bugs.debian.org, 964456-done@bugs.debian.org, 964588-done@bugs.debian.org, 964713-done@bugs.debian.org, 964727-done@bugs.debian.org, 964764-done@bugs.debian.org, 964777-done@bugs.debian.org, 964809-done@bugs.debian.org, 964813-done@bugs.debian.org, 964861-done@bugs.debian.org, 922170-done@bugs.debian.org
- Subject: Closing requests for fixes included in 9.13 point release
- From: "Adam D. Barratt" <adam@adam-barratt.org.uk>
- Date: Sat, 18 Jul 2020 13:07:00 +0100
- Message-id: <b8d89cdfeeda7b6d1ef96a8706a20f9525c2151b.camel@adam-barratt.org.uk>
Package: release.debian.org Version: 9.13 Hi, All of these requests relate to updates that were included in today's stretch point release. Regards, Adam
--- End Message ---