Your message dated Wed, 16 Jan 2008 15:02:03 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#461067: fixed in ngircd 0.10.3-2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: ngircd
Version: 0.10.3-1~bpo.1
Severity: important

>From <http://arthur.barton.de/pipermail/ngircd-ml/2008-January/000301.html>:


ngIRCd 0.10.4 has been released, fixing a security bug which could  
cause the server to access invalid memory and to crash while handling  
specially crafted PART commands. All installations should be upgraded!

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (540, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-5-686
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)

Versions of packages ngircd depends on:
ii  libc6                  2.3.6.ds1-13etch4 GNU C Library: Shared libraries
ii  libssp0                4.1.1-21          GCC stack smashing protection libr

ngircd recommends no packages.

-- no debconf information



--- End Message ---
--- Begin Message ---
Source: ngircd
Source-Version: 0.10.3-2

We believe that the bug you reported is fixed in the latest version of
ngircd, which is due to be installed in the Debian FTP archive:

ngircd_0.10.3-2.diff.gz
  to pool/main/n/ngircd/ngircd_0.10.3-2.diff.gz
ngircd_0.10.3-2.dsc
  to pool/main/n/ngircd/ngircd_0.10.3-2.dsc
ngircd_0.10.3-2_i386.deb
  to pool/main/n/ngircd/ngircd_0.10.3-2_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Mario Iseli <[EMAIL PROTECTED]> (supplier of updated ngircd package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 16 Jan 2008 15:31:32 +0100
Source: ngircd
Binary: ngircd
Architecture: source i386
Version: 0.10.3-2
Distribution: unstable
Urgency: high
Maintainer: Mario Iseli <[EMAIL PROTECTED]>
Changed-By: Mario Iseli <[EMAIL PROTECTED]>
Description: 
 ngircd     - Next generation IRC Server
Closes: 461067
Changes: 
 ngircd (0.10.3-2) unstable; urgency=high
 .
   * Added 05-CVE-2008-0285.dpatch from Nico Golde to fix the following
     security issue:
     - A crafted PART message could lead to referencing invalid memory and thus
       causing a denial of service situation (CVE-2008-0285; Closes: #461067).
Files: 
 3323345400778f9fe59fc8cb2d6f5faf 580 net optional ngircd_0.10.3-2.dsc
 df4c86419eb31b77a99585b977cec716 7587 net optional ngircd_0.10.3-2.diff.gz
 63aa2daf2b34b7a87fcdeed014227562 82838 net optional ngircd_0.10.3-2_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHjheAJ9EDSN0bDvcRAtNwAJ0e9SVqEXQ4xB7d1sTuldWO8sfErgCdGnyT
8ccpb91H3jL9gGeKCyfaseg=
=NDZI
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to