Accepted trafficserver 8.1.9+ds-1~deb11u1 (source) into oldstable-proposed-updates
- To: debian-changes@lists.debian.org
- Subject: Accepted trafficserver 8.1.9+ds-1~deb11u1 (source) into oldstable-proposed-updates
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Tue, 07 Nov 2023 21:18:10 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: trafficserver_8.1.9+ds-1~deb11u1_source.changes
- Debian-source: trafficserver
- Debian-suite: oldstable-proposed-updates
- Debian-version: 8.1.9+ds-1~deb11u1
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=w0tuvVvMcG5YqY9wPJzvKZQ5xuPNRjAcJQa6iU2Lr5g=; b=h8T8OCi/U0RQNZH6vC2NrOV8v1 IpKeXelQm2ayG7ZeEDHnNpu4T6sLmHy6NM/Ht5ESjJkOsQ744K7pNCqMuItYmXQPNBTT+s922qV+u tXSXpqpvMrJo0sk2PlkcgZ/ZvCreoOca9X84LdB4ybj6Q7IoPf0uIY6wcv4c4mr5wiiiKpdnp51bL gzy0oIJ4onyDjD7/iLklrrw9K65NirVx6ALnYwUQSLbZo86l092vF6rALbXNFcv+QEjYxl9BrTnZq WWc5PIkZzl30L5oj4h5j1Z48RRgxnFb59sQFcw4jjH2xuabY797dydwx1DSovqZ/c89TxZyhLPdnA siO2DcMA==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1r0TSc-000dJh-39@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Thu, 02 Nov 2023 17:00:26 +0100
Source: trafficserver
Architecture: source
Version: 8.1.9+ds-1~deb11u1
Distribution: bullseye-security
Urgency: medium
Maintainer: Jean Baptiste Favre <debian@jbfavre.org>
Changed-By: Jean Baptiste Favre <debian@jbfavre.org>
Closes: 1053801 1054427
Changes:
trafficserver (8.1.9+ds-1~deb11u1) bullseye-security; urgency=medium
.
* New upstream version 8.1.9+ds
* Update d/patches for 8.1.9+ds-1~deb11u1 release
* Update d/trafficserver-experimental-plugins.install
* Multiple CVE fixes for 8.1.x (Closes: #1054427, Closes: #1053801)
- CVE-2022-47185: Improper input validation vulnerability
- CVE-2023-33934: Improper Input Validation vulnerability
- CVE-2023-41752: Exposure of Sensitive Information to an Unauthorized Actor
- CVE-2023-44487: The HTTP/2 protocol allows a denial of service
Checksums-Sha1:
b8f93f14f6ebf4d2976c34dc7b84cc98d0540fc8 2880 trafficserver_8.1.9+ds-1~deb11u1.dsc
691ce5e7162f39114c6674ccc79f1def178e6d2f 7960728 trafficserver_8.1.9+ds.orig.tar.xz
880c08113128ed13a9503927329260e12f1414d4 45752 trafficserver_8.1.9+ds-1~deb11u1.debian.tar.xz
8feb43f9a0c79ad9b2de671437e06903a4102c05 14224 trafficserver_8.1.9+ds-1~deb11u1_source.buildinfo
Checksums-Sha256:
3c4074ee7fc877412cabf74ed189459f3fc399502ead263200c33a59c1a26ceb 2880 trafficserver_8.1.9+ds-1~deb11u1.dsc
06ff4a3211d2811577f9075da0b95f0d1b51a305713926e4ea0c980c0c06e150 7960728 trafficserver_8.1.9+ds.orig.tar.xz
fdb821ecbd0c24639cba094ba7fee5f11b4e61b73204d48f671414d0235ded94 45752 trafficserver_8.1.9+ds-1~deb11u1.debian.tar.xz
a30bbcf7fb4e2b3b2baa90e9e6584c6332a2e3bef65059a8901ebb700e5502c4 14224 trafficserver_8.1.9+ds-1~deb11u1_source.buildinfo
Files:
3c13e32b889801b30b35c41e76fc6138 2880 web optional trafficserver_8.1.9+ds-1~deb11u1.dsc
8ebaff42368e815ab477d2d64bcff50f 7960728 web optional trafficserver_8.1.9+ds.orig.tar.xz
17f223fec44e3615ce460fdb4ac6cdf6 45752 web optional trafficserver_8.1.9+ds-1~deb11u1.debian.tar.xz
a247d3fc59225767a822b0605c44a7d4 14224 web optional trafficserver_8.1.9+ds-1~deb11u1_source.buildinfo
-----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEEToRbojDLTUSJBphHtN1Tas99hzcFAmVD12RfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDRF
ODQ1QkEyMzBDQjRENDQ4OTA2OTg0N0I0REQ1MzZBQ0Y3RDg3MzcACgkQtN1Tas99
hzeNPw//ZdAfm68z+6Cr0cUxkZQmoHL1fi9f1ZaxyXJoldqEQPhUXazXWjLZIe96
u8lkP+EYMENDT9nvRgfDy8AvR2uLuLWYRiahXCcBlWQRG0vA3cYMBjMulp5O7dP+
Y+QyFBfrCGPkFpcyBdA2dewG87xWBS8+hB8BFoAOD3ghrOWkvsRkpjzHGQkkhAUS
mmLreYGggVcCERM1zqQD4vZxsZaoZAGr42CsXqGqGyzWYhIHo5ckz4DbZJk0GJXY
UpXAVY6TBl4gcCy3tijyUayOJp/BdDHZy3k4/P03F/Yj10K525kPO38/n9NNVKgX
6FQ06CpQi56skAK4C7MpS5CsRxe4dHEfRyGthJoADFGiHlNPvtIW20Wan6f9pIiy
1RGoRW2iPWzIWhvsQhvYHGqj6bTDdgKyHBQ879DNSGMQ7oo6uDkC9JqbrgHcRj7x
ZznBnW+1eakgqTXgpAaeYUYD5lToUPTlMvjgW0mp7zTEMJ3Ow3hOdEe11OkL4Oj+
HBJKdfJu5x3hKTGW0IyvIZxcGBduraVRkwF3DATVo0HGsovLO8l5PyM7Q2TFTY05
+zDw6dSS56gaaJoPXkTaE+ty2Rwo7W+ORWlaZYpcJ5aVabiRLSoF0Xpwe1z2hjMz
J+xlhpj4mrlkiWwojsQBOXH3IEPRMThxSVt+3s8u9+FFByOu4jA=
=nLH5
-----END PGP SIGNATURE-----