Your message dated Wed, 19 Oct 2016 12:47:08 +0000
with message-id <e1bwqgy-0001ra...@franck.debian.org>
and subject line Bug#841162: fixed in quagga 0.99.23.1-1+deb8u3
has caused the Debian Bug report #841162,
regarding quagga: CVE-2016-1245: zebra: stack overrun in IPv6 RA receive code
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
841162: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=841162
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: quagga
Version: 0.99.23.1-1
Severity: grave
Tags: security upstream patch

Hi,

the following vulnerability was published for quagga.

CVE-2016-1245[0]:
zebra: stack overrun in IPv6 RA receive code

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-1245

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: quagga
Source-Version: 0.99.23.1-1+deb8u3

We believe that the bug you reported is fixed in the latest version of
quagga, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 841...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <car...@debian.org> (supplier of updated quagga package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 18 Oct 2016 09:57:46 +0200
Source: quagga
Binary: quagga quagga-dbg quagga-doc
Architecture: all source
Version: 0.99.23.1-1+deb8u3
Distribution: jessie-security
Urgency: high
Maintainer: Christian Hammers <c...@debian.org>
Changed-By: Salvatore Bonaccorso <car...@debian.org>
Closes: 841162
Description: 
 quagga     - BGP/OSPF/RIP routing daemon
 quagga-dbg - BGP/OSPF/RIP routing daemon (debug symbols)
 quagga-doc - documentation files for quagga
Changes:
 quagga (0.99.23.1-1+deb8u3) jessie-security; urgency=high
 .
   * Non-maintainer upload by the Security Team.
   * zebra: stack overrun in IPv6 RA receive code (CVE-2016-1245)
     (Closes: #841162)
Checksums-Sha1: 
 e7f5d6b52e0de9f8f3b7bbea99369fecd30bb2bd 2306 quagga_0.99.23.1-1+deb8u3.dsc
 30785870c5e43167a224d2bebd99dea548abd43a 39008 
quagga_0.99.23.1-1+deb8u3.debian.tar.xz
 03f5a9e83e26dee3bd918192d27d71efea6b392e 907704 
quagga-doc_0.99.23.1-1+deb8u3_all.deb
Checksums-Sha256: 
 23d4081f21041248e1ea9f7eee285356e3d761f9b553f2e013fd4a4db3da619e 2306 
quagga_0.99.23.1-1+deb8u3.dsc
 e7934bd1e41808f2097efe93478111ac3e32dcc71d34955f337a837a0573a1ad 39008 
quagga_0.99.23.1-1+deb8u3.debian.tar.xz
 b975c24798a3590dfa0e0484f508e0266e290e126d62523eed027ce58d0ae6b6 907704 
quagga-doc_0.99.23.1-1+deb8u3_all.deb
Files: 
 97a1bf8e25e716c561b3b69a21a9bd7c 2306 net optional 
quagga_0.99.23.1-1+deb8u3.dsc
 c3571ef57255f77c46a5d7bc75df1b5f 39008 net optional 
quagga_0.99.23.1-1+deb8u3.debian.tar.xz
 1180ebdd35c5e3d8ebbe6d65aa2c0dc7 907704 net optional 
quagga-doc_0.99.23.1-1+deb8u3_all.deb

-----BEGIN PGP SIGNATURE-----
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=07hM
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to