Your message dated Sat, 12 Sep 2015 22:18:58 +0000
with message-id <[email protected]>
and subject line Bug#796114: fixed in netty 1:4.0.31-1
has caused the Debian Bug report #796114,
regarding CVE-2015-2156
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
796114: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796114
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: netty
Severity: grave
Tags: security

This was assigned CVE-2015-2156:
http://netty.io/news/2015/05/08/3-9-8-Final-and-3.html

Fix:
https://github.com/slandelle/netty/commit/800555417e77029dcf8a31d7de44f27b5a8f79b8.patch

In addition to src:netty (3.2.6), there's also src:netty-3.9 (3.9.0)
and there was also src:netty3.1 at some point (now removed).

Please phase out src:netty towards the updated src:netty-3.9 so that
there's only one version around.

Cheers,
        Moritz

--- End Message ---
--- Begin Message ---
Source: netty
Source-Version: 1:4.0.31-1

We believe that the bug you reported is fixed in the latest version of
netty, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Emmanuel Bourg <[email protected]> (supplier of updated netty package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sat, 12 Sep 2015 23:26:11 +0200
Source: netty
Binary: libnetty-java
Architecture: source all
Version: 1:4.0.31-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Java Maintainers 
<[email protected]>
Changed-By: Emmanuel Bourg <[email protected]>
Description:
 libnetty-java - Java NIO client/server socket framework
Closes: 796114
Changes:
 netty (1:4.0.31-1) unstable; urgency=medium
 .
   * Team upload.
 .
   [ Emmanuel Bourg ]
   * New upstream release:
     - Build with maven-debian-helper
     - Fixes CVE-2015-2156 (Closes: #796114)
   * debian/control:
     - Team maintenance by Debian Java Maintainers
     - Standards-Version updated to 3.9.6 (no changes)
     - Removed the deprecated DM-Upload-Allowed field
   * debian/watch: Track the release tags on GitHub
   * Moved the package to Git
   * Switch to debhelper level 9
 .
   [ Charles Plessy ]
   * Updated homepage (debian/control).
Checksums-Sha1:
 141658461f985419d8050287c3281fd55d270295 2389 netty_4.0.31-1.dsc
 dee2ec4162c643bd67bb97aa3c4804ca7d74585d 1182407 netty_4.0.31.orig.tar.gz
 3a1a33558ec980814347fe08c42fcc2cda95d742 6612 netty_4.0.31-1.debian.tar.xz
 a5a6dd0e3661233862a567fc4e4697847419a30d 1722430 libnetty-java_4.0.31-1_all.deb
Checksums-Sha256:
 126e2d9db564a34d8bc8c5cde60ac5c46860be879e2f4e6af6f2be5c76e1933e 2389 
netty_4.0.31-1.dsc
 d69e57012763a53f26d4ca4839c7378f43b7648e33b0e95f76a3666e4bdb9ebf 1182407 
netty_4.0.31.orig.tar.gz
 76a7dd093841c1c22d90762923cb4209233988926f9b0b7c8819468e24abebbb 6612 
netty_4.0.31-1.debian.tar.xz
 ffb69c61203d36ece215df52b7ff03f6edbfed9baea96da2de18ee47a588e6c2 1722430 
libnetty-java_4.0.31-1_all.deb
Files:
 8a63029db970c99680906ea819319c72 2389 java optional netty_4.0.31-1.dsc
 67a4919773dfbf0e7eb276f12eda34a4 1182407 java optional netty_4.0.31.orig.tar.gz
 ed79e8e05ad68a9e8922f19ffbedb532 6612 java optional 
netty_4.0.31-1.debian.tar.xz
 23a788f1d63bf3e402f299b0b7aad874 1722430 java optional 
libnetty-java_4.0.31-1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=hatd
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to