Your message dated Sat, 19 Jun 2021 10:56:39 +0100 with message-id <5c65c3ad2ac9b1b1f78bf73b1cf073041e619b51.camel@adam-barratt.org.uk> and subject line Closing p-u requests for fixes included in 10.10 point release has caused the Debian Bug report #984604, regarding buster-pu: package sabnzbdplus/2.3.6+dfsg-1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 984604: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984604 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian BTS Submit <submit@bugs.debian.org>
- Subject: buster-pu: package sabnzbdplus/2.3.6+dfsg-1
- From: Jeroen Ploemen <linux@jcf.pm>
- Date: Fri, 5 Mar 2021 20:00:50 +0100
- Message-id: <20210305200050.08c6bdca@vip.jcf.pm>
Package: release.debian.org User: release.debian.org@packages.debian.org Usertags: pu Tags: buster Severity: normal The sabnzbdplus package in buster is affected by a security issue (CVE-2020-13124), permitting code execution from the program's web interface through crafted settings. By default, the web interface is only accessible from localhost, with no authentication required. Affected versions are 2.0.0RC1 - 3.0.0Beta3 (inclusive), see the upstream security advisory [1] for details. The issue has been fixed in testing and unstable already via a regular upload of a newer upstream release. For buster, the relevant upstream commits have been backported, see the attached debdiff. The security team was contacted but didn't consider this issue severe enough to warrant a DSA, and suggested going with a regular update instead [2]. [1] https://github.com/sabnzbd/sabnzbd/security/advisories/GHSA-9x87-96gg-33w2 [2] https://security-tracker.debian.org/tracker/CVE-2020-13124Attachment: buster_sabnzbdplus_2.3.6+dfsg-1.debdiff
Description: Binary dataAttachment: pgpci7ALwObDH.pgp
Description: OpenPGP digital signature
--- End Message ---
--- Begin Message ---
- To: 934206-done@bugs.debian.org, 982996-done@bugs.debian.org, 983110-done@bugs.debian.org, 984604-done@bugs.debian.org, 985791-done@bugs.debian.org, 985792-done@bugs.debian.org, 985943-done@bugs.debian.org, 986001-done@bugs.debian.org, 986014-done@bugs.debian.org, 986112-done@bugs.debian.org, 986224-done@bugs.debian.org, 986673-done@bugs.debian.org, 987038-done@bugs.debian.org, 987042-done@bugs.debian.org, 987048-done@bugs.debian.org, 987164-done@bugs.debian.org, 987210-done@bugs.debian.org, 987246-done@bugs.debian.org, 987489-done@bugs.debian.org, 987494-done@bugs.debian.org, 987529-done@bugs.debian.org, 987531-done@bugs.debian.org, 987548-done@bugs.debian.org, 987719-done@bugs.debian.org, 987725-done@bugs.debian.org, 987726-done@bugs.debian.org, 987731-done@bugs.debian.org, 987859-done@bugs.debian.org, 987958-done@bugs.debian.org, 988255-done@bugs.debian.org, 988314-done@bugs.debian.org, 988365-done@bugs.debian.org, 988453-done@bugs.debian.org, 988454-done@bugs.debian.org, 988455-done@bugs.debian.org, 988482-done@bugs.debian.org, 988492-done@bugs.debian.org, 988508-done@bugs.debian.org, 988936-done@bugs.debian.org, 988962-done@bugs.debian.org, 988974-done@bugs.debian.org, 988977-done@bugs.debian.org, 989023-done@bugs.debian.org, 989024-done@bugs.debian.org, 989129-done@bugs.debian.org, 989132-done@bugs.debian.org, 989420-done@bugs.debian.org, 989422-done@bugs.debian.org, 989509-done@bugs.debian.org, 989623-done@bugs.debian.org, 989668-done@bugs.debian.org, 989701-done@bugs.debian.org, 989702-done@bugs.debian.org, 989768-done@bugs.debian.org, 989772-done@bugs.debian.org
- Subject: Closing p-u requests for fixes included in 10.10 point release
- From: "Adam D. Barratt" <adam@adam-barratt.org.uk>
- Date: Sat, 19 Jun 2021 10:56:39 +0100
- Message-id: <5c65c3ad2ac9b1b1f78bf73b1cf073041e619b51.camel@adam-barratt.org.uk>
Package: release.debian.org Version: 10.10 Hi, Each of the updates referenced in these bugs was included in the 10.10 point release today. Regards, Adam
--- End Message ---