[Debian-med-packaging] Bug#1009900: fis-gtm: Multiple CVEs in fis-gtm

Andreas Tille andreas at fam-tille.de
Thu Jun 16 15:13:33 BST 2022


Hi Amul,

Am Thu, Jun 16, 2022 at 12:16:09PM +0000 schrieb Shah, Amul:
> Thanks for explaining that! I was very worried that the reproducible
> builds would fail the version.

I guess you were worried since Salsa-CI was informing you about this.
It was actually no change to the situation before ... except that we
recently switched on Salsa-CI and so you became aware of the issue which
existed all the time before.

> Did I do the right things to properly close
> the two bugs logged against fis-gtm?

Yes.
 
> We have another release coming out by the end of the month. I
> should have that one uploaded sooner than later.

Please reconsider the "add any minor version bump leads to a new binary
file name" strategy.  This means that fis-gtm always needs to pass the
Debian new queue which always means that there is a hardly predictable
delay when the package will reach the distribution.
 
> thanks,

Thanks to you as well

     Andreas.

> Amul
> 
> From: Andreas Tille <andreas at fam-tille.de>
> Date: Thursday, 06 16, 2022 at 05:23 AM
> To: Shah, Amul <Amul.Shah at fisglobal.com>
> Cc: Neil Williams <codehelp at debian.org>, 1009900 at bugs.debian.org <1009900 at bugs.debian.org>
> Subject: Re: Bug#1009900: fis-gtm: Multiple CVEs in fis-gtm
> Hi Amul,
> 
> Am Wed, Jun 15, 2022 at 01:50:32PM +0000 schrieb Shah, Amul:
> > Hi Andreas and Neil,
> > I pushed my changes (for real this time)
> 
> Thanks for pushing.  I confirm I have uploaded the package to NEW (due
> to new binary package name.
> 
> > and the CI/CD pipeline reported a failure for reproducibility (https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsalsa.debian.org%2Fmed-team%2Ffis-gtm%2F-%2Fjobs%2F2874740&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=khmOXK3qZrSw%2BLbzR6AcHQN%2FvmGdAH5KAyB01DoD1fI%3D&reserved=0). I’m not sure what to do with this failure because GT.M generates output files in the build which modifies time stamps and what not. I’m reading the reprotest man page. Do either of you have any advice? For example, things I should not do.
> 
> Reproducible builds can be a bit complex.  I admit I *personally* tend
> to ignore those issues and wait until reproducibility team might develop
> a patch since they have way more experience in this field.  Usually its
> a consequence of the upstream build system, for instance like adding the
> time stamp of the build.  This should rather be replaced by the time
> stamp of the debian/changelog for instance.
> 
> Since reproducibility is not a critical issue for a package (but for
> sure nice to have!) and if you have no real idea what to do its probably
> fine as it is now.
> 
> Kind regards
> 
>       Andreas.
> 
> > Thanks,
> > Amul
> >
> > From: Shah, Amul <Amul.Shah at fisglobal.com>
> > Date: Thursday, 06 09, 2022 at 04:53 PM
> > To: Neil Williams <codehelp at debian.org>, Andreas Tille <andreas at an3as.eu>
> > Cc: 1009900 at bugs.debian.org <1009900 at bugs.debian.org>
> > Subject: Re: Bug#1009900: fis-gtm: Multiple CVEs in fis-gtm
> > Hi Andreas and Neil,
> > Thanks for you input and patience. I pushed FIS GT.M V7.0-002 which includes the fixes for the CVEs listed in Bug#1009900. That was easier than back porting the fixes.
> >
> > Thanks,
> > Amul
> >
> > On 04/21/22, 02:51 AM, "Neil Williams" <codehelp at debian.org> wrote:
> > On Wed, 20 Apr 2022 19:55:02 +0000
> > "Shah, Amul" <Amul.Shah at fisglobal.com<mailto:Amul.Shah at fisglobal.com>> wrote:
> >
> > > Hi Andreas,
> > > In FIS's opinion, the CVE references are not actionable.
> >
> > (The usual term would be "exploitable".) I understand that, the CVEs
> > arose from fuzz testing, so represent weaknesses, not active attacks.
> >
> > > One must
> > > have host access and the ability to modify application source files.
> > > Those users are typically database/systems administrators or a MUMPS
> > > application developer. We expect that only privileged users have
> > > direct access to the host with the application gating access to
> > > external users. By itself, GT.M does not confer any extra privileges.
> > >
> > > How long we have to address these CVEs?
> >
> > I did not set an RC severity, I chose 'important' on the basis of the
> > description in the upstream issue. There is no specific time limit for
> > these CVEs - the vulnerabilities are already public, not embargoed
> > until a set date. The highest severities are reserved for remotely
> > exploitable CVEs.
> >
> > For unstable, the best fix would seem to be a new upstream release.
> > There are multiple CVEs, some CVEs reference multiple commits.
> >
> > > If immediate, I can
> > > back-patch the specific fixes that address the CVEs. I say back patch
> > > because V6.3-014 was the last V6 version with a V6 block format
> > > database. The current V7 GT.M versions do not have an upgrade path to
> > > the V7 block format. We do not want to release a GT.M version to
> > > debmed without such an upgrade feature. If there is time, then we are
> > > working a V7 version with the V6 to V7 block upgrade capability and
> > > would like to release that.
> >
> > Seems sensible.
> >
> >
> > >
> > > Thanks,
> > > Amul
> > >
> > > -----Original Message-----
> > > From: Andreas Tille <andreas at an3as.eu<mailto:andreas at an3as.eu>>
> > > Sent: Wednesday, April 20, 2022 3:00 PM
> > > To: Neil Williams <codehelp at debian.org<mailto:codehelp at debian.org>>; 1009900 at bugs.debian.org<mailto:1009900 at bugs.debian.org>;
> > > Shah, Amul <Amul.Shah at fisglobal.com<mailto:Amul.Shah at fisglobal.com>> Subject: Re: Bug#1009900:
> > > fis-gtm: Multiple CVEs in fis-gtm
> > >
> > > Hi Amul,
> > >
> > > I guess a new upstream version will fix this.  Are you able to prepare
> > > the latest version?
> > >
> > > Kind regards
> > >
> > >        Andreas.
> > >
> > > Am Wed, Apr 20, 2022 at 11:13:31AM +0100 schrieb Neil Williams:
> > > > Source: fis-gtm
> > > > Version: 6.3-014-3
> > > > Severity: important
> > > > Tags: security
> > > > X-Debbugs-Cc: codehelp at debian.org<mailto:codehelp at debian.org>, Debian Security Team
> > > > <team at security.debian.org<mailto:team at security.debian.org>>
> > > >
> > > > Hi,
> > > >
> > > > The following vulnerabilities were published for fis-gtm.
> > > >
> > > > CVE-2021-44492[0]:
> > > > | An issue was discovered in YottaDB through r1.32 and V7.0-000 and
> > > > FIS | GT.M through V7.0-000. Using crafted input, attackers can
> > > > cause a type | to be incorrectly initialized in the function f_incr
> > > > in | sr_port/f_incr.c and cause a crash due to a NULL pointer
> > > > dereference.
> > > >
> > > >
> > > > CVE-2021-44493[1]:
> > > > | An issue was discovered in YottaDB through r1.32 and V7.0-000 and
> > > > FIS | GT.M through V7.0-000. Using crafted input, an attacker can
> > > > cause a | call to $Extract to force an signed integer holding the
> > > > size of a | buffer to take on a large negative number, which is
> > > > then used as the | length of a memcpy call that occurs on the
> > > > stack, causing a buffer | overflow.
> > > >
> > > >
> > > > CVE-2021-44494[2]:
> > > > | An issue was discovered in YottaDB through r1.32 and V7.0-000 and
> > > > FIS | GT.M through V7.0-000. Using crafted input, an attacker can
> > > > cause | calls to ZRead to crash due to a NULL pointer dereference.
> > > >
> > > >
> > > > CVE-2021-44495[3]:
> > > > | An issue was discovered in YottaDB through r1.32 and V7.0-000 and
> > > > FIS | GT.M through V7.0-000. Using crafted input, an attacker can
> > > > cause a | NULL pointer dereference after calls to ZPrint.
> > > >
> > > >
> > > > CVE-2021-44496[4]:
> > > > | An issue was discovered in FIS GT.M through V7.0-000 (related to
> > > > the | YottaDB code base). Using crafted input, an attacker can
> > > > control the | size variable and buffer that is passed to a call to
> > > > memcpy. An | attacker can use this to overwrite key data structures
> > > > and gain | control of the flow of execution.
> > > >
> > > >
> > > > CVE-2021-44497[5]:
> > > > | An issue was discovered in FIS GT.M through V7.0-000 (related to
> > > > the | YottaDB code base). Using crafted input, can cause the bounds
> > > > of a for | loop to be miscalculated, which leads to a use after
> > > > free condition a | pointer is pushed into previously free memory by
> > > > the loop.
> > > >
> > > >
> > > > CVE-2021-44498[6]:
> > > > | An issue was discovered in FIS GT.M through V7.0-000 (related to
> > > > the | YottaDB code base). Using crafted input, attackers can cause
> > > > a type to | be incorrectly initialized in the function f_incr in
> > > > sr_port/f_incr.c | and cause a crash due to a NULL pointer
> > > > dereference.
> > > >
> > > >
> > > > CVE-2021-44499[7]:
> > > > | An issue was discovered in FIS GT.M through V7.0-000 (related to
> > > > the | YottaDB code base). Using crafted input, an attacker can
> > > > cause a call | to $Extract to force an signed integer holding the
> > > > size of a buffer to | take on a large negative number, which is
> > > > then used as the length of a | memcpy call that occurs on the
> > > > stack, causing a buffer overflow.
> > > >
> > > >
> > > > CVE-2021-44500[8]:
> > > > | An issue was discovered in FIS GT.M through V7.0-000 (related to
> > > > the | YottaDB code base). A lack of input validation in calls to
> > > > eb_div in | sr_port/eb_muldiv.c allows attackers to crash the
> > > > application by | performing a divide by zero.
> > > >
> > > >
> > > > CVE-2021-44501[9]:
> > > > | An issue was discovered in FIS GT.M through V7.0-000 (related to
> > > > the | YottaDB code base). Using crafted input, an attacker can
> > > > cause calls | to ZRead to crash due to a NULL pointer dereference.
> > > >
> > > >
> > > > CVE-2021-44502[10]:
> > > > | An issue was discovered in FIS GT.M through V7.0-000 (related to
> > > > the | YottaDB code base). Using crafted input, an attacker can
> > > > control the | size of a memset that occurs in calls to util_format
> > > > in | sr_unix/util_output.c.
> > > >
> > > >
> > > > CVE-2021-44503[11]:
> > > > | An issue was discovered in FIS GT.M through V7.0-000 (related to
> > > > the | YottaDB code base). Using crafted input, an attacker can
> > > > cause a call | to va_arg on an empty variadic parameter list, most
> > > > likely causing a | memory segmentation fault.
> > > >
> > > >
> > > > CVE-2021-44504[12]:
> > > > | An issue was discovered in FIS GT.M through V7.0-000 (related to
> > > > the | YottaDB code base). Using crafted input, an attacker can
> > > > cause a size | variable, stored as an signed int, to equal an
> > > > extremely large value, | which is interpreted as a negative value
> > > > during a check. This value is | then used in a memcpy call on the
> > > > stack, causing a memory segmentation | fault.
> > > >
> > > >
> > > > CVE-2021-44505[13]:
> > > > | An issue was discovered in FIS GT.M through V7.0-000 (related to
> > > > the | YottaDB code base). Using crafted input, an attacker can
> > > > cause a NULL | pointer dereference after calls to ZPrint.
> > > >
> > > >
> > > > CVE-2021-44506[14]:
> > > > | An issue was discovered in FIS GT.M through V7.0-000 (related to
> > > > the | YottaDB code base). A lack of input validation in calls to
> > > > do_verify | in sr_unix/do_verify.c allows attackers to attempt to
> > > > jump to a NULL | pointer by corrupting a function pointer.
> > > >
> > > >
> > > > CVE-2021-44507[15]:
> > > > | An issue was discovered in FIS GT.M through V7.0-000 (related to
> > > > the | YottaDB code base). A lack of parameter validation in calls
> > > > to memcpy | in str_tok in sr_unix/ztimeoutroutines.c allows
> > > > attackers to attempt | to read from a NULL pointer.
> > > >
> > > >
> > > > CVE-2021-44508[16]:
> > > > | An issue was discovered in FIS GT.M through V7.0-000 (related to
> > > > the | YottaDB code base). A lack of NULL checks in calls to
> > > > ious_open in | sr_unix/ious_open.c allows attackers to crash the
> > > > application by | dereferencing a NULL pointer.
> > > >
> > > >
> > > > CVE-2021-44509[17]:
> > > > | An issue was discovered in FIS GT.M through V7.0-000 (related to
> > > > the | YottaDB code base). Using crafted input, attackers can cause
> > > > an | integer underflow of the size of calls to memset in op_fnj3 in
> > > > | sr_port/op_fnj3.c in order to cause a segmentation fault and
> > > > crash the | application.
> > > >
> > > >
> > > > CVE-2021-44510[18]:
> > > > | An issue was discovered in FIS GT.M through V7.0-000 (related to
> > > > the | YottaDB code base). Using crafted input, attackers can cause a
> > > > | calculation of the size of calls to memset in op_fnj3 in
> > > > | sr_port/op_fnj3.c to result in an extremely large value in order
> > > > to | cause a segmentation fault and crash the application.
> > > >
> > > >
> > > > If you fix the vulnerabilities please also make sure to include the
> > > > CVE (Common Vulnerabilities & Exposures) ids in your changelog
> > > > entry.
> > > >
> > > > For further information see:
> > > >
> > > > [0]
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2021-44492&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=GVOvP%2FE%2FCSBfn7uiBXJu48Oa6LjaNi5AMtmcdEg8cw8%3D&reserved=0
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcve.mitre.org%2Fcgi-bin%2Fcvename.cgi%3Fname%3DCVE-2021-44492&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=bzDGwfAl0Ma%2BAr84ABmC4jDAOo7Qa2YWAk1rVg8Jf4c%3D&reserved=0
> > > > [1]
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2021-44493&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=LV8ggOtH6Gy6EO0chPZYnHInk%2FVC%2BXrMb5H2D2Uw8Hg%3D&reserved=0
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcve.mitre.org%2Fcgi-bin%2Fcvename.cgi%3Fname%3DCVE-2021-44493&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=1yX2TZbdPI9m8BsHifj89y9gLyDVWz04cGiTltc0rDQ%3D&reserved=0
> > > > [2]
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2021-44494&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=8HOh52r49LKtEi%2FHSldZ4gDpA%2BEvBfydwGlgPchal0c%3D&reserved=0
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcve.mitre.org%2Fcgi-bin%2Fcvename.cgi%3Fname%3DCVE-2021-44494&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=FAuBCz%2F%2B77Itan0OXetAvh%2BUwDyHWHI5sCnlEqTvma0%3D&reserved=0
> > > > [3]
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2021-44495&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=xdMktLdJkCUNGbeC7BYMAyYovAATryezPwDC5XOvTw8%3D&reserved=0
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcve.mitre.org%2Fcgi-bin%2Fcvename.cgi%3Fname%3DCVE-2021-44495&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=ukZUMFZx5QQK9tes4Fypz8As60E4n3N52GzCAg0EnCY%3D&reserved=0
> > > > [4]
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2021-44496&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=aAZVxFu4gPOrzVLZJDIkAaAiNNBP8BWfsFmWT2wdq5U%3D&reserved=0
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcve.mitre.org%2Fcgi-bin%2Fcvename.cgi%3Fname%3DCVE-2021-44496&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=SkTWS3R1oFU1gZmDcMcZpkEhQSt%2BUKwCniiR84JzjGY%3D&reserved=0
> > > > [5]
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2021-44497&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=ssbOVLhiw1zqQO3LFMkyr%2B2ggxiYbJtN0xLkXmGldPQ%3D&reserved=0
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcve.mitre.org%2Fcgi-bin%2Fcvename.cgi%3Fname%3DCVE-2021-44497&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=29N70E%2BnUzOB9dQAWOLH0LEONhAruX7nUCARv5Cz5CA%3D&reserved=0
> > > > [6]
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2021-44498&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=%2BPDe0gsZ4zgYAd%2BObjQQyk%2B2z0KW40SmmLDDrqf9o7w%3D&reserved=0
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcve.mitre.org%2Fcgi-bin%2Fcvename.cgi%3Fname%3DCVE-2021-44498&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=gGJy5ypfv4GeZz2uLXgAprHakDkCCHaav4A93rlGxeY%3D&reserved=0
> > > > [7]
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2021-44499&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=hMXk%2B2Gwk6MIOFwicB36CF%2F2RjqL%2BA8O44tF78Dyux0%3D&reserved=0
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcve.mitre.org%2Fcgi-bin%2Fcvename.cgi%3Fname%3DCVE-2021-44499&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=S3xNRIA3XIdTRsz75joxFtKR3VpeYrcLgSHYsViRu%2Bw%3D&reserved=0
> > > > [8]
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2021-44500&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=q0qjxlQuVmMymhLEhWzrTJuIlCqRszRaIc%2Bez3QhCtI%3D&reserved=0
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcve.mitre.org%2Fcgi-bin%2Fcvename.cgi%3Fname%3DCVE-2021-44500&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=LLvB1Pdwu5AKj8bG5rdEFyD0%2BFWK5G4SspEhEaFc48c%3D&reserved=0
> > > > [9]
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2021-44501&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=ZlEpiVomA0Bjd47rSoAKkknmcRwaQm7kkeDClcdz6kc%3D&reserved=0
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcve.mitre.org%2Fcgi-bin%2Fcvename.cgi%3Fname%3DCVE-2021-44501&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=763tlMtgRGWkSpk2KBHYR0tCsfK5dDivtdbMDRTizrM%3D&reserved=0
> > > > [10]
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2021-44502&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=Nl1qUuXcDin5ZyBIoh0tqSZaMKiqVUMuvX26iSXpcYg%3D&reserved=0
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcve.mitre.org%2Fcgi-bin%2Fcvename.cgi%3Fname%3DCVE-2021-44502&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=g%2F2o%2F2Ndd0iRiAep67VAM3UAnfeRHPrOFL9x7%2FezjPY%3D&reserved=0
> > > > [11]
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2021-44503&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=7xUOtnpGKyh8aF6PAKhhwwPYQDslnKTdXFPEw%2Fx%2BoUA%3D&reserved=0
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcve.mitre.org%2Fcgi-bin%2Fcvename.cgi%3Fname%3DCVE-2021-44503&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=RvmA8Z2EJKOy%2FISbcRnZ8GKzzEaenndAb5vaYPV%2BVPk%3D&reserved=0
> > > > [12]
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2021-44504&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=4xKyKVXExFgmjVl4k5r4P632%2Bzivkui1aVI%2Fkl2V6To%3D&reserved=0
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcve.mitre.org%2Fcgi-bin%2Fcvename.cgi%3Fname%3DCVE-2021-44504&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=zyjZ2g8AD36WOrVtzJoCbZbmfp7hP5GRFWuIhGLDoFI%3D&reserved=0
> > > > [13]
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2021-44505&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=kLMefEsQ1h0h%2F%2BzjJX%2FjKw3A3FNcdAl7%2F7bMgePRM5M%3D&reserved=0
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcve.mitre.org%2Fcgi-bin%2Fcvename.cgi%3Fname%3DCVE-2021-44505&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=GuBrLBpI%2FvIPaghghwWfzKYc0Csip5e9WZra9gBDgR4%3D&reserved=0
> > > > [14]
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2021-44506&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=uOvyPrlmtY2nsRIawKgnEpmLPFUVvUES6Qd76F%2FyeCU%3D&reserved=0
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcve.mitre.org%2Fcgi-bin%2Fcvename.cgi%3Fname%3DCVE-2021-44506&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=MUxBaMPVKTO21x7BmTkAV3a7qa1nkTLZL6EvSPK7Rbw%3D&reserved=0
> > > > [15]
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2021-44507&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=rq1p28hk9v0GUP9630ZNC%2Bc3eBYBHJUnYIN1yk%2FlPTk%3D&reserved=0
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcve.mitre.org%2Fcgi-bin%2Fcvename.cgi%3Fname%3DCVE-2021-44507&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=TmaD3ylk%2FZuwpKOPWXdMyPgFCbynvcfqWYu%2FjeaS%2BlY%3D&reserved=0
> > > > [16]
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2021-44508&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=kxzZKX9GnvGtJdkak9HvsFx82pkhN1PP88L8DOXTJbQ%3D&reserved=0
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcve.mitre.org%2Fcgi-bin%2Fcvename.cgi%3Fname%3DCVE-2021-44508&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=gjmAFQs1s0GgF1Z%2BCtwVspqLoJx2dUen66gMzZDq8Lg%3D&reserved=0
> > > > [17]
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2021-44509&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=WXYAe6MKD0RMKS55AQ0%2FftV%2B4Gt6W2nmVYIQZyvzH94%3D&reserved=0
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcve.mitre.org%2Fcgi-bin%2Fcvename.cgi%3Fname%3DCVE-2021-44509&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=Hg3hXgTmNEH8hZk40F1nNbSyA5c%2ByM8T0py4PBhaHIE%3D&reserved=0
> > > > [18]
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity-tracker.debian.org%2Ftracker%2FCVE-2021-44510&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=sCWhaOQM0JbAq8cnWY45DzJx9KrNJnYPTofmvSkBiVE%3D&reserved=0
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcve.mitre.org%2Fcgi-bin%2Fcvename.cgi%3Fname%3DCVE-2021-44510&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=BwWpJrPO8TyJbV01gjx19mERdfBbeRL6vXq5GSsjjYw%3D&reserved=0
> > > >
> > > > Please adjust the affected versions in the BTS as needed.
> > > >
> > > >
> > > > -- System Information:
> > > > Debian Release: bookworm/sid
> > > >   APT prefers unstable
> > > >   APT policy: (500, 'unstable'), (1, 'experimental')
> > > > Architecture: amd64 (x86_64)
> > > > Foreign Architectures: i386
> > > >
> > > > Kernel: Linux 5.16.0-6-amd64 (SMP w/16 CPU threads; PREEMPT)
> > > > Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8),
> > > > LANGUAGE=en_GB:en Shell: /bin/sh linked to /usr/bin/dash
> > > > Init: systemd (via /run/systemd/system)
> > > > LSM: AppArmor: enabled
> > > >
> > > > _______________________________________________
> > > > Debian-med-packaging mailing list
> > > > Debian-med-packaging at alioth-lists.debian.net<mailto:Debian-med-packaging at alioth-lists.debian.net>
> > > > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Falioth-lists.debian.net%2Fcgi-bin%2Fmailman%2Flistinfo%2Fdebian-med-packaging&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=YdDAFBFNpsI8%2Bn8oDu8PPpEw0%2B%2F0wCaJryWDIzpZTNs%3D&reserved=0
> > > >
> > >
> > > --
> > > https://eur02.safelinks.protection.outlook.com/?url=http%3A%2F%2Ffam-tille.de%2F&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=q3Hj7qleDbx9e6sCyHuFoDQoXDcIkHSMQngBPKkTplc%3D&reserved=0
> > > The information contained in this message is proprietary and/or
> > > confidential. If you are not the intended recipient, please: (i)
> > > delete the message and all copies; (ii) do not disclose, distribute
> > > or use the message in any manner; and (iii) notify the sender
> > > immediately. In addition, please be aware that any message addressed
> > > to our domain is subject to archiving and review by persons other
> > > than the intended recipient. Thank you.
> >
> >
> > --
> > Neil Williams
> > =============
> > https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Flinux.codehelp.co.uk%2F&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=3BUi7XU2itf1lQFeUsSfI%2FTKnk0zHSW%2FZOL%2B%2F0JmxOA%3D&reserved=0
> >
> > The information contained in this message is proprietary and/or confidential. If you are not the intended recipient, please: (i) delete the message and all copies; (ii) do not disclose, distribute or use the message in any manner; and (iii) notify the sender immediately. In addition, please be aware that any message addressed to our domain is subject to archiving and review by persons other than the intended recipient. Thank you.
> 
> --
> https://eur02.safelinks.protection.outlook.com/?url=http%3A%2F%2Ffam-tille.de%2F&data=05%7C01%7Camul.shah%40fisglobal.com%7C6b002e9869384d6cadd308da4f79e086%7Ce3ff91d834c84b15a0b418910a6ac575%7C0%7C0%7C637909682140179197%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=q3Hj7qleDbx9e6sCyHuFoDQoXDcIkHSMQngBPKkTplc%3D&reserved=0
> The information contained in this message is proprietary and/or confidential. If you are not the intended recipient, please: (i) delete the message and all copies; (ii) do not disclose, distribute or use the message in any manner; and (iii) notify the sender immediately. In addition, please be aware that any message addressed to our domain is subject to archiving and review by persons other than the intended recipient. Thank you.

-- 
http://fam-tille.de



More information about the Debian-med-packaging mailing list