Your message dated Wed, 04 Feb 2015 23:02:06 +0000
with message-id <e1yj8xs-0007qu...@franck.debian.org>
and subject line Bug#776490: fixed in privoxy 3.0.19-2+deb7u2
has caused the Debian Bug report #776490,
regarding privoxy: CVE-2015-1380 CVE-2015-1381 CVE-2015-1382
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
776490: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776490
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: privoxy
Version: 3.0.21-5
Severity: grave
Tags: security upstream patch fixed-upstream

Hi,

the following vulnerabilities were published for privoxy.

CVE-2015-1380[0]:
denial of service

CVE-2015-1381[1]:
multiple segmentation faults and memory leaks in the pcrs code

CVE-2015-1382[2]:
invalid read

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2015-1380
[1] https://security-tracker.debian.org/tracker/CVE-2015-1381
[2] https://security-tracker.debian.org/tracker/CVE-2015-1382

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: privoxy
Source-Version: 3.0.19-2+deb7u2

We believe that the bug you reported is fixed in the latest version of
privoxy, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 776...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Roland Rosenfeld <rol...@debian.org> (supplier of updated privoxy package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 28 Jan 2015 20:33:47 +0100
Source: privoxy
Binary: privoxy
Architecture: source amd64
Version: 3.0.19-2+deb7u2
Distribution: wheezy-security
Urgency: medium
Maintainer: Roland Rosenfeld <rol...@debian.org>
Changed-By: Roland Rosenfeld <rol...@debian.org>
Description: 
 privoxy    - Privacy enhancing HTTP Proxy
Closes: 776490
Changes: 
 privoxy (3.0.19-2+deb7u2) wheezy-security; urgency=medium
 .
   * 38_CVE-2015-1381: multiple segmentation faults and memory leaks in the
     pcrs code.
   * 39_CVE-2015-1382: invalid read.
   * These 2 patches Closes: #776490 in wheezy.
Checksums-Sha1: 
 913524b0bf23c82f3f1ed41637bd7db378d7e1f4 1826 privoxy_3.0.19-2+deb7u2.dsc
 9e508293711250e90d6fcf75ee13e569a615c4d7 22336 
privoxy_3.0.19-2+deb7u2.debian.tar.gz
 a5ee45379a7ef4f66aac61ce520c45cc7a469920 629734 
privoxy_3.0.19-2+deb7u2_amd64.deb
Checksums-Sha256: 
 2511634342de719359618fad1b6d37df4fe3e96accf8d3b2f69ea2826f643157 1826 
privoxy_3.0.19-2+deb7u2.dsc
 ba1a43b29cbe3c10838e8890e246a279804ff357f79dc5f02443fd4a5632cced 22336 
privoxy_3.0.19-2+deb7u2.debian.tar.gz
 68c06c05867b81218f3f77451388a4726f9daeb7503dae2be916c5ae9bbd2df0 629734 
privoxy_3.0.19-2+deb7u2_amd64.deb
Files: 
 1441d751cbcf21993e183b454296acbb 1826 web optional privoxy_3.0.19-2+deb7u2.dsc
 ec41efe440f600bcc7aaa3cda4f876be 22336 web optional 
privoxy_3.0.19-2+deb7u2.debian.tar.gz
 8a767afd0eb4326c88cbb45bcd96afc5 629734 web optional 
privoxy_3.0.19-2+deb7u2_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=dbay
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to