Your message dated Thu, 09 Jun 2016 22:17:13 +0000
with message-id <e1bb8gh-0004ei...@franck.debian.org>
and subject line Bug#824160: fixed in p7zip 9.20.1~dfsg.1-4.1+deb8u2
has caused the Debian Bug report #824160,
regarding p7zip: CVE-2016-2334 CVE-2016-2335
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
824160: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=824160
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: p7zip
Version: 15.14.1+dfsg-1
Severity: grave
Tags: security upstream fixed-upstream

Hi,

the following vulnerabilities were published for p7zip.

CVE-2016-2334[0]:
Heap-buffer-overflow vulnerability

CVE-2016-2335[1]:
Out-of-bounds read vuilerability

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-2334
[1] https://security-tracker.debian.org/tracker/CVE-2016-2335

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: p7zip
Source-Version: 9.20.1~dfsg.1-4.1+deb8u2

We believe that the bug you reported is fixed in the latest version of
p7zip, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 824...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <car...@debian.org> (supplier of updated p7zip package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 08 Jun 2016 16:50:10 +0200
Source: p7zip
Binary: p7zip p7zip-full
Architecture: source
Version: 9.20.1~dfsg.1-4.1+deb8u2
Distribution: jessie-security
Urgency: high
Maintainer: Mohammed Adnène Trojette <adn+...@diwi.org>
Changed-By: Salvatore Bonaccorso <car...@debian.org>
Closes: 824160
Description: 
 p7zip      - 7z file archiver with high compression ratio
 p7zip-full - 7z and 7za file archivers with high compression ratio
Changes:
 p7zip (9.20.1~dfsg.1-4.1+deb8u2) jessie-security; urgency=high
 .
   * Non-maintainer upload by the Security Team.
   * CVE-2016-2335: UDF CInArchive::ReadFileItem code execution vulnerability
     (Closes: #824160)
Checksums-Sha1: 
 1364dc25642b9f9a8eeab8032c11f093388c61d1 1825 
p7zip_9.20.1~dfsg.1-4.1+deb8u2.dsc
 c10983919213d9a7a63d8c194ecd4255e5675092 16213 
p7zip_9.20.1~dfsg.1-4.1+deb8u2.diff.gz
Checksums-Sha256: 
 2ee6af4fed08a9f1fee8bb0915a8e2429d07802fe3c1fa0df0b4d57546d124e2 1825 
p7zip_9.20.1~dfsg.1-4.1+deb8u2.dsc
 72f96dc48d5ec84ee7ad83bde67e46684c640f3e84c0182dae914860d513a5bf 16213 
p7zip_9.20.1~dfsg.1-4.1+deb8u2.diff.gz
Files: 
 ee03402a16d9eb141b9bf1d18326ad4a 1825 utils optional 
p7zip_9.20.1~dfsg.1-4.1+deb8u2.dsc
 6921f103fa9b7ae461f576ee678520b0 16213 utils optional 
p7zip_9.20.1~dfsg.1-4.1+deb8u2.diff.gz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=LoUv
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to