Accepted modsecurity-apache 2.9.3-1+deb10u2 (source) into oldstable
- To: dispatch@tracker.debian.org, debian-lts-changes@lists.debian.org
- Subject: Accepted modsecurity-apache 2.9.3-1+deb10u2 (source) into oldstable
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Thu, 26 Jan 2023 18:40:22 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: modsecurity-apache_2.9.3-1+deb10u2_source.changes
- Debian-source: modsecurity-apache
- Debian-suite: oldstable
- Debian-version: 2.9.3-1+deb10u2
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.seger; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=XIdls15ARYbSTpeOGWoIkCxVwd3Pk7u3b62cs3BdHkA=; b=LH37iOilYBLNmFvk80gm92bQYT biiVmmIfjdBFeQ6HdDz+R1UdnLSyx7xB7vO/gkPeUfdd/9YH2MyYeGe5ktavVSVUGlESWSF73PfH9 PMKGtAN/XzCr3NBgOzihATrp1sFn58mfQ/C130TeSsFXcs2bJle5M2KIt/sH/OMVFJwPET+PWDLwo CqBIcvAxzjgxr2AoPTGApo6ycXnt2F2KZKQGc4kBG0cSj52/SNej0sLoqBndq3zRto9K2gw6mDUgv n3iNS5vyPHgMpFmUxv7ZVxMKi5qpEgqdBMl2irRLpdOhh82Hq84piKvcst/PWOoM7ese8TR/Umojf jXE8QFWg==;
- Mail-followup-to: debian-lts@lists.debian.org
- Message-id: <E1pL7Ac-00F5J1-Tf@seger.debian.org>
- Reply-to: debian-lts@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Thu, 26 Jan 2023 19:25:15 +0100
Source: modsecurity-apache
Architecture: source
Version: 2.9.3-1+deb10u2
Distribution: buster-security
Urgency: high
Maintainer: Alberto Gonzalez Iniesta <agi@inittab.org>
Changed-By: Tobias Frost <tobi@debian.org>
Closes: 1029329
Changes:
modsecurity-apache (2.9.3-1+deb10u2) buster-security; urgency=high
.
* Non-maintainer upload by the LTS Security Team
.
[ Ervin Hegedus ]
* Added multipart_part_headers.patch
.
[ Tobias Frost ]
* Pull updated upstream version of multipart_part_headers.patch and
rename it to reflect the CVE it fixes (CVE-2022-48279) and update the
recommended configuration accordingly.
* Import upstream patch for CVE-2023-24021 (Closes: #1029329)
Checksums-Sha1:
9c94ccbeffaf77a0daa76dcee8ad2b2851f050d8 1968 modsecurity-apache_2.9.3-1+deb10u2.dsc
a8dd7c1841e47cf95329e564342127c87a685322 14844 modsecurity-apache_2.9.3-1+deb10u2.debian.tar.xz
b76cb0b10b63e35b26cb0ea176249778c2a9e07e 7653 modsecurity-apache_2.9.3-1+deb10u2_amd64.buildinfo
Checksums-Sha256:
9d2b82a2a9648267ab84227fc408a28a0ba01cb95cab1e566e6fabe781be844a 1968 modsecurity-apache_2.9.3-1+deb10u2.dsc
af193482356929ad3a1989575f4733e9211c2ad1d450646918af36f057519155 14844 modsecurity-apache_2.9.3-1+deb10u2.debian.tar.xz
4d95ae25e67313907b873b0eb07586563bd73b7e19b88b8b62f9ecdab8e72a28 7653 modsecurity-apache_2.9.3-1+deb10u2_amd64.buildinfo
Files:
00751a1d0592eca578decd14655aaa7a 1968 httpd optional modsecurity-apache_2.9.3-1+deb10u2.dsc
87d4ad869c170312b07d2fc87de04f35 14844 httpd optional modsecurity-apache_2.9.3-1+deb10u2.debian.tar.xz
f0db32a7073419ca8a011273c72b6b3e 7653 httpd optional modsecurity-apache_2.9.3-1+deb10u2_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=BuTN
-----END PGP SIGNATURE-----