Source: ceph
Source-Version: 14.2.15-1

On Wed, Dec 29, 2021 at 09:21:07AM +0000, Debian Bug Tracking System wrote:
> This is an automatic notification regarding your Bug report
> which was filed against the src:ceph package:
> 
> #975300: ceph: CVE-2020-10753: radosgw: HTTP header injection via CORS 
> ExposeHeader tag
> 
> It has been closed by Thomas Goirand <z...@debian.org>.
> 
> Their explanation is attached below along with your original report.
> If this explanation is unsatisfactory and you have not received a
> better one in a separate message then please contact Thomas Goirand 
> <z...@debian.org> by
> replying to this email.
> 
> 
> -- 
> 975300: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=975300
> Debian Bug Tracking System
> Contact ow...@bugs.debian.org with problems

> From: Thomas Goirand <z...@debian.org>
> User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
>  Thunderbird/78.14.0
> Date: Wed, 29 Dec 2021 10:20:03 +0100
> To: 975300-d...@bugs.debian.org
> Subject: Fixed
> Message-ID: <aa892be9-7ee8-a88b-0389-bfb1de0a9...@debian.org>
> 
> This was fixed in Bullseye, and in unstable.

Right, TTBOMK, should be with the upload of 14.2.15-1 to unstable. So
marking it as such.

Regards,
Salvatore

Reply via email to