Package: chasquid
Version: 1.11-2+b2
Severity: normal

Hi all,

you might have heard about the latest SMTP smuggling vulnerability. Author of chasquid responsed by releasing 1.13 and 1.11.1 (<https://github.com/albertito/chasquid/releases/tag/v1.11.1>) with the backported fix. From <https://tracker.debian.org/pkg/chasquid>, I understand that 1.13 was automatically accepted into testing, but I didn't notice anything happening regarding 1.11.1 (my server is on Debian stable, which only has 1.11), so I wanted to politely ask if this could be processed as well.

I have very little knowledge about the Debian packaging and release process, so please correct if I have any major misunderstanding of the process and what I'm asking is unreasonable.

Thank you for your work.
Best
Matej


-- System Information:
Debian Release: 12.4
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.1.0-10-cloud-amd64 (SMP w/2 CPU threads; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages chasquid depends on:
ii  libc6  2.36-9+deb12u3

chasquid recommends no packages.

chasquid suggests no packages.

-- Configuration Files:
/etc/chasquid/certs/README.certs [Errno 2] No such file or directory: '/etc/chasquid/certs/README.certs'
/etc/chasquid/chasquid.conf changed [not included]
/etc/chasquid/hooks/post-data changed [not included]

-- no debconf information

Reply via email to