Your message dated Wed, 28 Jan 2015 19:04:05 +0000
with message-id <e1ygxuh-0002af...@franck.debian.org>
and subject line Bug#776490: fixed in privoxy 3.0.21-7
has caused the Debian Bug report #776490,
regarding privoxy: CVE-2015-1380 CVE-2015-1381 CVE-2015-1382
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
776490: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776490
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: privoxy
Version: 3.0.21-5
Severity: grave
Tags: security upstream patch fixed-upstream
Hi,
the following vulnerabilities were published for privoxy.
CVE-2015-1380[0]:
denial of service
CVE-2015-1381[1]:
multiple segmentation faults and memory leaks in the pcrs code
CVE-2015-1382[2]:
invalid read
If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2015-1380
[1] https://security-tracker.debian.org/tracker/CVE-2015-1381
[2] https://security-tracker.debian.org/tracker/CVE-2015-1382
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: privoxy
Source-Version: 3.0.21-7
We believe that the bug you reported is fixed in the latest version of
privoxy, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 776...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Roland Rosenfeld <rol...@debian.org> (supplier of updated privoxy package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Wed, 28 Jan 2015 19:46:42 +0100
Source: privoxy
Binary: privoxy
Architecture: source amd64
Version: 3.0.21-7
Distribution: unstable
Urgency: medium
Maintainer: Roland Rosenfeld <rol...@debian.org>
Changed-By: Roland Rosenfeld <rol...@debian.org>
Description:
privoxy - Privacy enhancing HTTP Proxy
Closes: 776490
Changes:
privoxy (3.0.21-7) unstable; urgency=medium
.
* 37_CVE-2015-1380: denial of service.
* 38_CVE-2015-1381: multiple segmentation faults and memory leaks in the
pcrs code.
* 39_CVE-2015-1382: invalid read.
* These 3 patches Closes: #776490.
Checksums-Sha1:
1636758a325c8085834bdc4c56388e06365dc060 1824 privoxy_3.0.21-7.dsc
01ddc80bcfdfb04b0c8dfcda67bc76478fc5a3e9 20772 privoxy_3.0.21-7.debian.tar.xz
a73d60db94283891c3a8ef4cd88a827b072087d0 493744 privoxy_3.0.21-7_amd64.deb
Checksums-Sha256:
d75f232d3b4991127c752c1d5f1be4d89ad1297d6e05e6318f1d029d236d00b7 1824
privoxy_3.0.21-7.dsc
b759e3772a0b310840bb1e46046554630e46c917fa79fd76719f3d76816a297e 20772
privoxy_3.0.21-7.debian.tar.xz
6c1c50ebcf84c1af9a591003956ca3e2984e27ee0f68bd6d257fe2f2a997c0c5 493744
privoxy_3.0.21-7_amd64.deb
Files:
9b8abc89fa09c732c790bf637e9dadb4 1824 web optional privoxy_3.0.21-7.dsc
af768dd87f67f947a807c6ed8f7f47df 20772 web optional
privoxy_3.0.21-7.debian.tar.xz
3b535b4b082b23ea66dfdeb46ca7e9f5 493744 web optional privoxy_3.0.21-7_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=jDnP
-----END PGP SIGNATURE-----
--- End Message ---