Your message dated Mon, 15 May 2017 10:33:36 +0000
with message-id <e1dadjo-000gy3...@fasolo.debian.org>
and subject line Bug#862505: fixed in smb4k 1.2.1-2
has caused the Debian Bug report #862505,
regarding smb4k: CVE-2017-8849
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
862505: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862505
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: smb4k
Version: 1.1.2-1
Severity: important
Tags: security patch upstream

Hi,

the following vulnerability was published for smb4k.

CVE-2017-8849[0]:
No description was found (try on a search engine)

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-8849
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8849
[1] https://www.kde.org/info/security/advisory-20170510-2.txt

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: smb4k
Source-Version: 1.2.1-2

We believe that the bug you reported is fixed in the latest version of
smb4k, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 862...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Maximiliano Curia <m...@debian.org> (supplier of updated smb4k package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 15 May 2017 12:18:34 +0200
Source: smb4k
Binary: smb4k
Architecture: source
Version: 1.2.1-2
Distribution: unstable
Urgency: medium
Maintainer: Debian KDE Extras Team <pkg-kde-extras@lists.alioth.debian.org>
Changed-By: Maximiliano Curia <m...@debian.org>
Description:
 smb4k      - Samba (SMB) share advanced browser
Closes: 862505
Changes:
 smb4k (1.2.1-2) unstable; urgency=medium
 .
   * Team upload.
   * Cherry pick "Find the mount/umount commands in the helper"
     This fixes CVE-2017-8849 (Closes: 862505)
Checksums-Sha1:
 f71b183269fe5565a7ee0b81b015225ff11b4b90 2033 smb4k_1.2.1-2.dsc
 2e112d63bcf08564ce40df91438c2477f57b5461 7360 smb4k_1.2.1-2.debian.tar.xz
 cc4b5eb9a4dfe4234dcbee5670e1584ddce1145c 7328 smb4k_1.2.1-2_source.buildinfo
Checksums-Sha256:
 91a6f6fe82fc0de93f5f845c4a1fee3f36dda153e4dd8eba64ca592e1cd889f4 2033 
smb4k_1.2.1-2.dsc
 5d8f900c3ed974183121358ced59ac7331fe5dc9bb9485bbb4654bb398cf604e 7360 
smb4k_1.2.1-2.debian.tar.xz
 007bc5a6f742422426d94f4aaad097d3806ab51db8b898a2cb63416e898be35b 7328 
smb4k_1.2.1-2_source.buildinfo
Files:
 3ca8f3f5889dd4d96c630a8891179892 2033 kde optional smb4k_1.2.1-2.dsc
 494856e636419709302d52b4d824fa10 7360 kde optional smb4k_1.2.1-2.debian.tar.xz
 d3632daef0148bfdfd8e4528cda979c9 7328 kde optional 
smb4k_1.2.1-2_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=rDUp
-----END PGP SIGNATURE-----

--- End Message ---
_______________________________________________
pkg-kde-extras mailing list
pkg-kde-extras@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-kde-extras

Reply via email to