This is a multi-part message in MIME format...
Your message dated Sat, 09 Mar 2024 00:04:55 +0000
with message-id <
E1rikCt-0033ip-Co@fasolo.debian.org>
and subject line Bug#1055852: fixed in frr 9.1-0.1
has caused the Debian Bug report #1055852,
regarding frr: CVE-2023-38407 CVE-2023-41361 CVE-2023-46752 CVE-2023-46753 CVE-2023-47234 CVE-2023-47235
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact
owner@bugs.debian.org
immediately.)
--
1055852:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055852
Debian Bug Tracking System
Contact
owner@bugs.debian.org with problems
Received: (at submit) by bugs.debian.org; 12 Nov 2023 18:59:21 +0000 X-Spam-Checker-Version: SpamAssassin 3.4.6-bugs.debian.org_2005_01_02
(2021-04-09) on buxtehude.debian.org
X-Spam-Level:
X-Spam-Status: No, score=-4.7 required=4.0 tests=BAYES_00,FOURLA,MD5_SHA1_SUM,
RCVD_IN_DNSWL_LOW,SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE
autolearn=ham autolearn_force=no
version=3.4.6-bugs.debian.org_2005_01_02
X-Spam-Bayes: score:0.0000 Tokens: new, 73; hammy, 150; neutral, 59; spammy,
0. spammytokens: hammytokens:0.000-+--H*RU:inutil.org,
0.000-+--H*r:jmm, 0.000-+--UD:security-tracker.debian.org,
0.000-+--securitytrackerdebianorg, 0.000-+--security-tracker.debian.org Return-path: <
jmm@inutil.org>
Received: from inutil.org ([109.69.64.57]:47336 helo=viruvalge.hosting.plutex.de)
by buxtehude.debian.org with esmtps (TLS1.3:ECDHE_X25519__RSA_PSS_RSAE_SHA