Your message dated Tue, 20 Jul 2021 11:03:38 +0000
with message-id <e1m5nxg-0004k3...@fasolo.debian.org>
and subject line Bug#990835: fixed in suricata 1:6.0.1-3
has caused the Debian Bug report #990835,
regarding suricata: CVE-2021-35063
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
990835: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990835
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: suricata
Version: 1:6.0.1-2
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Control: fixed -1 1:6.0.3-1~exp1
Hi,
The following vulnerability was published for suricata.
CVE-2021-35063[0], it is mentioned in [1], but not much details
provided.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2021-35063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35063
[1] https://forum.suricata.io/t/suricata-6-0-3-and-5-0-7-released/1489
[2] https://bugzilla.redhat.com/show_bug.cgi?id=1980453
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: suricata
Source-Version: 1:6.0.1-3
Done: Sascha Steinbiss <sa...@debian.org>
We believe that the bug you reported is fixed in the latest version of
suricata, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 990...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Sascha Steinbiss <sa...@debian.org> (supplier of updated suricata package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Mon, 19 Jul 2021 13:26:22 +0200
Source: suricata
Architecture: source
Version: 1:6.0.1-3
Distribution: unstable
Urgency: medium
Maintainer: Pierre Chifflier <pol...@debian.org>
Changed-By: Sascha Steinbiss <sa...@debian.org>
Closes: 990835
Changes:
suricata (1:6.0.1-3) unstable; urgency=medium
.
* Address CVE-2021-35063 by backporting upstream fix.
Closes: #990835
Checksums-Sha1:
b9b0e2b091a047112d3d73fe1bb2eeb92115667b 2905 suricata_6.0.1-3.dsc
96a3c44864eb0b46f1c469116790d51ea9326927 32704 suricata_6.0.1-3.debian.tar.xz
50164ff586fcac09fb27d5a677260b7ae8ff4366 10049 suricata_6.0.1-3_amd64.buildinfo
Checksums-Sha256:
9aa949678be970f775c92e9b299f086d8685537fff34d203524e3afd69ce4563 2905
suricata_6.0.1-3.dsc
9ddceaefe16f69612e61f182f46c3416507b425c5a254f83e5bdaab19f79b502 32704
suricata_6.0.1-3.debian.tar.xz
5f1bec9c46b866355e946e555a27403ad65ab977d3bcfa87da6ce8eb8c639492 10049
suricata_6.0.1-3_amd64.buildinfo
Files:
6de508edc87adf9919a2d9a575ccc16a 2905 net optional suricata_6.0.1-3.dsc
3ea2e93a77a142f472eeefede03b7d6d 32704 net optional
suricata_6.0.1-3.debian.tar.xz
588c265a4e2b121df86b725c5fe37ddd 10049 net optional
suricata_6.0.1-3_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEWzS6WqtVB+kDQm6F6NN64vCfSHIFAmD2qqQACgkQ6NN64vCf
SHKk8Q//aKpYzs+S/LQl3J8FNASKxcIcDi1yNJL7hiiIizkvB5pNqSRqohgiYj49
qTfEJ0zfgdtzEiNy0KOORwkT0Zg8rMd7gy5NTssaqBweQYT+QKL/qz0vRZb7Xkrt
6rZErATTlRWT7HJUInYKNuIbAy56YXctGIPcyXLm2NUsp72hHb5oP6y3O9X1q5PV
UYmKlzHfy20cIrhFjhHEcqqGAEMr/a2cEAPMryo1ABAAXjDi5GWbLdCFN6GlAAK7
xTlPPljqCCCI1D4RHI8VafdZr7yfi28N+bXoqBapFw8SaT2GWCPiBLvOjfckGArJ
uBUcvAm4bEWgPRYfdUlv0shT7WPAMfswrNYxqhuyDl5DKTiGA4kPAj5GFkaa0zQJ
OdrcPGvkKnB4k9/A1QCWhdXUUE01CaGdS78/WhlzSiEpg/VIXEFCTSoLgGPn0iVA
XxnxvQV+1G1L/aDR33XctvXVGqYZEx6SZT1cpwbroUNXVSaqVWBN1YSQISxTptBD
pX4p3rUr/T5jdzGizPqbBT2HNDNinvlXxCUIH8bRWbVdy3zt1ufV073RETNluryP
L5T5KCmQRV7TKIz1zBbf8t/NNkNC735osHVMn8DoM/2HEUwXAwUSfq5WTf6WH0Vc
Kh1F8vzRMI3eNIG17ngYoczeFm1WVIRW5G2YhVKNHg42/Pa9Q+4=
=IosR
-----END PGP SIGNATURE-----
--- End Message ---