Your message dated Sat, 11 Mar 2023 09:22:43 +0000 with message-id <E1pavR5-008cVn-42@respighi.debian.org> and subject line unblock libtpms has caused the Debian Bug report #1032710, regarding unblock: libtpms/0.9.2-3.1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1032710: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032710 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: unblock: libtpms/0.9.2-3.1
- From: Salvatore Bonaccorso <carnil@debian.org>
- Date: Sat, 11 Mar 2023 09:50:08 +0100
- Message-id: <[🔎] 167852460807.2577900.4454410457055005326.reportbug@eldamar.lan>
Package: release.debian.org Severity: normal User: release.debian.org@packages.debian.org Usertags: unblock X-Debbugs-Cc: libtpms@packages.debian.org, Seunghun Han <kkamagui@gmail.com>, carnil@debian.org Control: affects -1 + src:libtpms Dear release team, Please unblock package libtpms It contains security fixes for CVE-2023-1017 and CVE-2023-1018. Side note: there is actually 0.9.2-3.1~deb12u1 already in bookworm-security and bookworm-proposed-updates now as the package was used to test the security suite setup for bookworm. Regards, Salvatore
--- End Message ---
--- Begin Message ---
- To: 1032710-done@bugs.debian.org
- Subject: unblock libtpms
- From: Sebastian Ramacher <sramacher@respighi.debian.org>
- Date: Sat, 11 Mar 2023 09:22:43 +0000
- Message-id: <E1pavR5-008cVn-42@respighi.debian.org>
Unblocked.
--- End Message ---