Your message dated Sun, 15 Jun 2014 06:49:14 +0000
with message-id <e1ww4fe-0001du...@franck.debian.org>
and subject line Bug#742816: fixed in smb4k 1.1.2-1
has caused the Debian Bug report #742816,
regarding smb4k: CVE-2014-2581
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
742816: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742816
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: smb4k
Severity: normal
Tags: security upstream fixed-upstream

Hi,

the following vulnerability was published for smb4k.

CVE-2014-2581[0]:
credentials cache leak

and is fixed in a new upstream version 1.1.1. This minor issue was
already marked no-dsa in the security-tracker.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2014-2581
[1] 
http://sourceforge.net/projects/smb4k/files/Smb4K%20%28stable%20releases%29/1.1.1/

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: smb4k
Source-Version: 1.1.2-1

We believe that the bug you reported is fixed in the latest version of
smb4k, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 742...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Mark Purcell <m...@debian.org> (supplier of updated smb4k package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sun, 15 Jun 2014 16:27:38 +1000
Source: smb4k
Binary: smb4k
Architecture: source i386
Version: 1.1.2-1
Distribution: unstable
Urgency: low
Maintainer: Debian KDE Extras Team <pkg-kde-extras@lists.alioth.debian.org>
Changed-By: Mark Purcell <m...@debian.org>
Description:
 smb4k      - Samba (SMB) share advanced browser for KDE
Closes: 710933 717497 742816
Changes:
 smb4k (1.1.2-1) unstable; urgency=low
 .
   * New upstream release
     - Fixes "CVE-2014-2581 - credentials cache leak" (Closes: #742816)
     - Fixes "[smb4k] Doesn't automount shares anymore" (Closes: #710933)
     - Fixes "smb4k does not work on Version 7.1 (wheezy) 32 bits, can't open
     the network" (Closes: #717497)
Checksums-Sha1:
 49b21d0b4426b7a9910260de7b5c67ef39ca85d9 1395 smb4k_1.1.2-1.dsc
 5eb0c2ba584ac954edeca12b4273916774fa3292 3062840 smb4k_1.1.2.orig.tar.xz
 92eb547099c8bdb975827c63d7bb1d4384a1761f 5176 smb4k_1.1.2-1.debian.tar.xz
 d9cacc6529e4c72e496508071cfb4152609a1266 3434750 smb4k_1.1.2-1_i386.deb
Checksums-Sha256:
 1f9d1c4ac0b1b9fd3f086d48bdb46f92b01844b56842d6083e72b294914df887 1395 
smb4k_1.1.2-1.dsc
 08664903dbab82f17894ef2c58b42fc0d857549df24b6e90c71c2db693e2e834 3062840 
smb4k_1.1.2.orig.tar.xz
 63f525e18cf8484a8c584a8a6ba45a429a53a18286f0ece311ecb48503ff8a4a 5176 
smb4k_1.1.2-1.debian.tar.xz
 ae24d4978a493c1d140cda836b15359c45dba81fea88fccacd0a827d129fb5f8 3434750 
smb4k_1.1.2-1_i386.deb
Files:
 91a877bd4f2698d9137a66fd68073204 3434750 kde optional smb4k_1.1.2-1_i386.deb
 0a275b822de546aac35f6c0610c178f7 1395 kde optional smb4k_1.1.2-1.dsc
 e8db39b7c316bba9e0fed015e335b2ab 3062840 kde optional smb4k_1.1.2.orig.tar.xz
 15a041c0e33b3a2d7c0ee66b6b6f6810 5176 kde optional smb4k_1.1.2-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlOdPwwACgkQoCzanz0IthLS5ACfU/fLD2Rw2RaltNx4QzRpOVRH
d8YAnRD6DOQu2D64bQsaaOs3JJnoGYfh
=0f0G
-----END PGP SIGNATURE-----

--- End Message ---
_______________________________________________
pkg-kde-extras mailing list
pkg-kde-extras@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-kde-extras

Reply via email to