Bug#1049325: Increasing severity

2023-08-31 Thread Sebastian Ramacher
Control: severity -1 normal

On 2023-08-30 22:52:25 +, Daniel Markstedt wrote:
> Control: severity -1 important
> X-Debbugs-Cc: pkg-netatalk-de...@alioth-lists.debian.net
> 
> Dear Debian Release Team,
> 
> Please allow me to raise the severity for this ticket.

Raising the severity won't change anything. (O)PU requests are processed
whenever the SRMs have time to do that. Please be patient.

Cheers

> The patches address 9 public CVE advisories, and I think it would be 
> beneficial to Bullseye users to have a patched package.
> 
> As mentioned before, the exact same patchset has been applied to 
> oldoldstable-security with help from the Security Team (special thanks to 
> Markus Koschany!)
> 
> Would it be possible to get feedback on the proposed release?
> 
> For reference, here are the relevant netatalk bug tickets that I know of.
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1025011
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036740
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043504
> 
> Thank you!
> 
> Daniel
> 

-- 
Sebastian Ramacher



Bug#1049325: Increasing severity

2023-08-30 Thread Daniel Markstedt
Control: severity -1 important
X-Debbugs-Cc: pkg-netatalk-de...@alioth-lists.debian.net

Dear Debian Release Team,

Please allow me to raise the severity for this ticket.
The patches address 9 public CVE advisories, and I think it would be beneficial 
to Bullseye users to have a patched package.

As mentioned before, the exact same patchset has been applied to 
oldoldstable-security with help from the Security Team (special thanks to 
Markus Koschany!)

Would it be possible to get feedback on the proposed release?

For reference, here are the relevant netatalk bug tickets that I know of.
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1025011
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036740
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043504

Thank you!

Daniel