Your message dated Thu, 24 Jan 2008 19:52:20 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#445883: fixed in dircproxy 1.0.5-5etch1
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: dircproxy
Version: 1.0.5-3
Severity: grave
Tags: security
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for dircproxy.
CVE-2007-5226[0]:
| irc_server.c in dircproxy 1.2.0 and earlier allows remote attackers to
| cause a denial of service (segmentation fault) via an ACTION command
| without a parameter, which triggers a NULL pointer dereference, as
| demonstrated using a blank /me message from irssi.
If you fix this vulnerability please also include the CVE id
in your changelog entry.
The null pointer dereference itself is not that big kind of
a problem here but since this also means to lose the data
you want to read while you are away I mark this as grave.
For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5226
Kind regards
Nico
--
Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgpy9Tchm89w4.pgp
Description: PGP signature
--- End Message ---
--- Begin Message ---
Source: dircproxy
Source-Version: 1.0.5-5etch1
We believe that the bug you reported is fixed in the latest version of
dircproxy, which is due to be installed in the Debian FTP archive:
dircproxy_1.0.5-5etch1.diff.gz
to pool/main/d/dircproxy/dircproxy_1.0.5-5etch1.diff.gz
dircproxy_1.0.5-5etch1.dsc
to pool/main/d/dircproxy/dircproxy_1.0.5-5etch1.dsc
dircproxy_1.0.5-5etch1_i386.deb
to pool/main/d/dircproxy/dircproxy_1.0.5-5etch1_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Martin Zobel-Helas <[EMAIL PROTECTED]> (supplier of updated dircproxy package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Thu, 24 Jan 2008 09:11:16 +0100
Source: dircproxy
Binary: dircproxy
Architecture: source i386
Version: 1.0.5-5etch1
Distribution: stable
Urgency: low
Maintainer: Alex Pennace <[EMAIL PROTECTED]>
Changed-By: Martin Zobel-Helas <[EMAIL PROTECTED]>
Description:
dircproxy - IRC proxy for people who use IRC from different workstations
Closes: 445883
Changes:
dircproxy (1.0.5-5etch1) stable; urgency=low
.
* Non-maintainer upload by SRM
* Backport upstream patch to fix a NULL pointer reference, which
can lead to a DoS (Closes: #445883)
Fixes: CVE-2007-5226
Files:
567a30ce73ab51456c9c561717f9fbb7 578 net optional dircproxy_1.0.5-5etch1.dsc
458702fb8f57d35ed431762ebf6f9986 14786 net optional
dircproxy_1.0.5-5etch1.diff.gz
ad5041f7ffbf4bacf7be31f24ac6a5f1 121220 net optional
dircproxy_1.0.5-5etch1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFHmEktST77jl1k+HARAn+uAKDnwEU+Xx5fKwF8RYSFVPN7CP+zwQCgpwZW
nBWwilZu1hB6SGzzzwZF3x0=
=LIs5
-----END PGP SIGNATURE-----
--- End Message ---