Your message dated Wed, 28 Jan 2015 18:18:50 +0000
with message-id <e1ygxcu-0005lb...@franck.debian.org>
and subject line Bug#776490: fixed in privoxy 3.0.21-6
has caused the Debian Bug report #776490,
regarding privoxy: CVE-2015-1380 CVE-2015-1381 CVE-2015-1382
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
776490: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776490
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: privoxy
Version: 3.0.21-5
Severity: grave
Tags: security upstream patch fixed-upstream

Hi,

the following vulnerabilities were published for privoxy.

CVE-2015-1380[0]:
denial of service

CVE-2015-1381[1]:
multiple segmentation faults and memory leaks in the pcrs code

CVE-2015-1382[2]:
invalid read

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2015-1380
[1] https://security-tracker.debian.org/tracker/CVE-2015-1381
[2] https://security-tracker.debian.org/tracker/CVE-2015-1382

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: privoxy
Source-Version: 3.0.21-6

We believe that the bug you reported is fixed in the latest version of
privoxy, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 776...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Roland Rosenfeld <rol...@debian.org> (supplier of updated privoxy package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 28 Jan 2015 17:49:15 +0100
Source: privoxy
Binary: privoxy
Architecture: source amd64
Version: 3.0.21-6
Distribution: unstable
Urgency: medium
Maintainer: Roland Rosenfeld <rol...@debian.org>
Changed-By: Roland Rosenfeld <rol...@debian.org>
Description:
 privoxy    - Privacy enhancing HTTP Proxy
Closes: 776490
Changes:
 privoxy (3.0.21-6) unstable; urgency=medium
 .
   * 37_CVE-2015-1380: denial of service.
   * 38_CVE-2015-1381: multiple segmentation faults and memory leaks in the
     pcrs code.
   * 39_CVE-2015-1381: invalid read.
   * These 3 patches Closes: #776490.
Checksums-Sha1:
 caecdf47e4a6390987449923b1c99389bc1f2647 1824 privoxy_3.0.21-6.dsc
 9f7c76600be352a5644bdfadbc616974a45c0fb2 20692 privoxy_3.0.21-6.debian.tar.xz
 686ba9bc2759989038d362b14b7ca76c3f671b46 493746 privoxy_3.0.21-6_amd64.deb
Checksums-Sha256:
 d2e08ef38990434c755fe688fa53f423f7d601b2b50922d9ca45ea0238e4febc 1824 
privoxy_3.0.21-6.dsc
 8787848de1b78d0e2283a5b37f1377ce192ad75621c8952a93a5522965de0456 20692 
privoxy_3.0.21-6.debian.tar.xz
 70162fce60aa61ab64f11ac7783fad05631d02dba6a300a46190bdbc377e3b40 493746 
privoxy_3.0.21-6_amd64.deb
Files:
 6f425e18cd1b6f76debee5e63dc06d99 1824 web optional privoxy_3.0.21-6.dsc
 3b172045888b4aeb5ec5eaa2516f4460 20692 web optional 
privoxy_3.0.21-6.debian.tar.xz
 20b46da2f77ac87d0c7d686ed13044a4 493746 web optional privoxy_3.0.21-6_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=iHUZ
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to