Bug#1021928: marked as done (libksba8: CVE-2022-3515 - remote code execution in libksba before 1.6.2)

Debian Bug Tracking System owner at bugs.debian.org
Mon Oct 17 19:27:07 BST 2022


Your message dated Mon, 17 Oct 2022 20:23:06 +0200
with message-id <Y02disxygXsFd8j+ at argenau.bebt.de>
and subject line Re: Bug#1021928: libksba8: CVE-2022-3515 - remote code execution in libksba before 1.6.2
has caused the Debian Bug report #1021928,
regarding libksba8: CVE-2022-3515 - remote code execution in libksba before 1.6.2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner at bugs.debian.org
immediately.)


-- 
1021928: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021928
Debian Bug Tracking System
Contact owner at bugs.debian.org with problems
-------------- next part --------------
An embedded message was scrubbed...
From: Thomas Arendsen Hein <thomas at intevation.de>
Subject: libksba8: CVE-2022-3515 - remote code execution in libksba before 1.6.2
Date: Mon, 17 Oct 2022 14:34:44 +0200
Size: 5292
URL: <http://alioth-lists.debian.net/pipermail/pkg-gnutls-maint/attachments/20221017/2af9a321/attachment.eml>
-------------- next part --------------
An embedded message was scrubbed...
From: Andreas Metzler <ametzler at bebt.de>
Subject: Re: Bug#1021928: libksba8: CVE-2022-3515 - remote code execution in libksba before 1.6.2
Date: Mon, 17 Oct 2022 20:23:06 +0200
Size: 3624
URL: <http://alioth-lists.debian.net/pipermail/pkg-gnutls-maint/attachments/20221017/2af9a321/attachment-0001.eml>


More information about the Pkg-gnutls-maint mailing list