Your message dated Mon, 14 Dec 2015 22:14:42 +0000
with message-id <e1a8boe-0002pb...@franck.debian.org>
and subject line Bug#807801: fixed in quassel 1:0.12.2-3
has caused the Debian Bug report #807801,
regarding CVE-2015-8547: quassel: op command denial of service vulnerability
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
807801: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=807801
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Package: quassel
Version: 1:0.12.2-2
Severity: important
Tags: security

Hi,

the following vulnerability was published for Quassel.

CVE-2015-8547: remotely triggerable DoS by any client on a Quassel core

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

https://security-tracker.debian.org/tracker/CVE-2015-8547
https://github.com/quassel/quassel/commit/b8edbda019eeb99da8663193e224efc9d1265dc7

Please adjust the affected versions in the BTS as needed.

- -- 
Henri Salo
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=aVIY
-----END PGP SIGNATURE-----

--- End Message ---
--- Begin Message ---
Source: quassel
Source-Version: 1:0.12.2-3

We believe that the bug you reported is fixed in the latest version of
quassel, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 807...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Felix Geyer <fge...@debian.org> (supplier of updated quassel package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 14 Dec 2015 21:25:33 +0100
Source: quassel
Binary: quassel-core quassel-client quassel quassel-data quassel-client-kde4 
quassel-kde4
Architecture: source
Version: 1:0.12.2-3
Distribution: unstable
Urgency: high
Maintainer: Debian KDE Extras Team <pkg-kde-extras@lists.alioth.debian.org>
Changed-By: Felix Geyer <fge...@debian.org>
Description:
 quassel    - distributed IRC client - monolithic core+client
 quassel-client - distributed IRC client - client component
 quassel-client-kde4 - transitional package to quassel-client
 quassel-core - distributed IRC client - core component
 quassel-data - distributed IRC client - shared data
 quassel-kde4 - transitional package to quassel
Closes: 807801
Changes:
 quassel (1:0.12.2-3) unstable; urgency=high
 .
   * Fix CVE-2015-8547: op command denial of service issue (Closes: #807801)
     - Add CVE-2015-8547.patch
Checksums-Sha1:
 6259ebadd4733c66179c3724b76ab68969bf5658 2636 quassel_0.12.2-3.dsc
 70bc922e1deb90758a05f25fb55367b19058352d 19128 quassel_0.12.2-3.debian.tar.xz
Checksums-Sha256:
 76e08ff26476c7dea478fa9388b6ca32f9252735f19123f5c0549d1b8e303093 2636 
quassel_0.12.2-3.dsc
 fe236cb2a98f57a57784f60601055f3e9e040497513fa715e530d58b15772cc7 19128 
quassel_0.12.2-3.debian.tar.xz
Files:
 bcf22c495bb0416fa186acf87fdee357 2636 net optional quassel_0.12.2-3.dsc
 9b4148ab7668afa8d6ba4c454634f48f 19128 net optional 
quassel_0.12.2-3.debian.tar.xz

-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJWbyYfAAoJEP4ixv2DE11FtHsP/3SKHlcGE6OqVqAhVYfJ+Bw9
4xJkeBywWiLAmWa2LXJVviqZBXNlrM1IMsvnKYkyO/Hs9HMgQeFATfs/y19+jRTW
q9eAJ138Dax3tLuSNKRlJfqg6YY6s7fhBsP2j/ZVJQhb8/bYmwb0+j2cYE9j23Jg
9iCQWyiMp/HNBbWHOdjbuvEa/yaAfRlU44f97/OebyGTlUeHfikvbDiLkG3JwmiV
TeXUVcGw6qHm55LhOtL7G+ijPQS9psP0GSeuE8wZdtHAixDNyuiDO3IBLyXZRr+Z
hgGZ/xZkixro74vYm7A9jNMRTfFyf8ALT6ySXf9wO7Dzd+EJnWIwyajlb2hulSYh
9hx+fCHctA/SJB9eY75+Tcp5vrOULmAuji3ddFGWp2MxsTz1j6mlJRhVs2z+GJ+f
6D4X/kWtRS8vVpQI6j92VX6oJWZ+8qdq1aSO6OYS9GeqrXzk9ADrcgnZIgysOEEc
Q4y3RxzY+IubY0LEJHBkbEmDeip08AlKLFkyNPTwfsAJgNcqe521u19lRSJNCJ6I
WhjCyOZBV3rGBVKKmg9cZgHGiIsTgTrtqyFnhJo/sR32G6t2hovSqf+ftV8XkpF1
y/2ueT8Z9Gx+awsTY3Smgm7Xrzb8IV157wgJc+76jduKWY3oey6nrSMc6gIkYXjd
kWoNQ0egJGuPz+Fx+PPR
=GnM+
-----END PGP SIGNATURE-----

--- End Message ---
_______________________________________________
pkg-kde-extras mailing list
pkg-kde-extras@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-kde-extras

Reply via email to