trafficserver (8.1.10+ds-1~deb11u1) bullseye-security; urgency=medium
authorJean Baptiste Favre <debian@jbfavre.org>
Sat, 13 Apr 2024 09:54:31 +0000 (11:54 +0200)
committerJean Baptiste Favre <debian@jbfavre.org>
Sat, 13 Apr 2024 09:54:31 +0000 (11:54 +0200)
commitcadbbf2becda5708b22dce263d2c0750b57a2284
tree35f2c522e32ac768db247d91451d06fb858b10b4
parent017d1bcbcc82abb49d728b94526b74d8e94eed0f
parent9127db52035df0aba86cbf3cb801ff6aa1f7d5d3
trafficserver (8.1.10+ds-1~deb11u1) bullseye-security; urgency=medium

  * New upstream version 8.1.10+ds
  * CVEs fix (Closes: #1068417)
    - CVE-2024-31309: HTTP/2 CONTINUATION DoS attack

[dgit import unpatched trafficserver 8.1.10+ds-1~deb11u1]
41 files changed:
debian/CONFIGURATION.Debian
debian/NEWS
debian/README.Debian
debian/README.conf-remap.Debian
debian/change_config.pl
debian/changelog
debian/control
debian/copyright
debian/docs
debian/gbp.conf
debian/not-installed
debian/patches/0003-reproductible-build.patch
debian/patches/0006-fix-doc-build.patch
debian/patches/0008-fix-python-check-unused-dependencies.patch
debian/patches/0009-fix-mysql-8-build.patch
debian/patches/0011-fix-segfault.patch
debian/patches/0012-fix-spelling-checks.patch
debian/patches/0013-fix-perl-interpreter-path.patch
debian/patches/0014-use_system_yaml-cpp.patch
debian/patches/0016-fix_python_3.8.patch
debian/patches/series
debian/rules
debian/salsa-ci.yml
debian/source/format
debian/source/options
debian/trafficserver-dev.examples
debian/trafficserver-dev.install
debian/trafficserver-dev.manpages
debian/trafficserver-experimental-plugins.install
debian/trafficserver.default
debian/trafficserver.dirs
debian/trafficserver.example
debian/trafficserver.init
debian/trafficserver.install
debian/trafficserver.maintscript
debian/trafficserver.manpages
debian/trafficserver.postinst
debian/trafficserver.service
debian/trafficserver.tmpfile
debian/upstream/signing-key.asc
debian/watch