[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1006124: marked as done (plasma-discover: Denial of Service bug)



Your message dated Sat, 19 Feb 2022 19:34:47 +0000
with message-id <E1nLVVH-0002zV-4j@fasolo.debian.org>
and subject line Bug#1006124: fixed in plasma-discover 5.23.5-2
has caused the Debian Bug report #1006124,
regarding plasma-discover: Denial of Service bug
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1006124: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1006124
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: plasma-discover
Version: 5.23.5-1
Severity: important
X-Debbugs-Cc: deltaone@debian.org

Hi all,

plasma-discover has a Denial of Service bug that sends huge amounts of requests
to KDE servers.

See the discussion of the KDE mailing-lists:
https://mail.kde.org/pipermail/distributions/2022-February/001124.html

--- End Message ---
--- Begin Message ---
Source: plasma-discover
Source-Version: 5.23.5-2
Done: Patrick Franz <deltaone@debian.org>

We believe that the bug you reported is fixed in the latest version of
plasma-discover, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1006124@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Patrick Franz <deltaone@debian.org> (supplier of updated plasma-discover package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 19 Feb 2022 20:20:11 +0100
Source: plasma-discover
Architecture: source
Version: 5.23.5-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Qt/KDE Maintainers <debian-qt-kde@lists.debian.org>
Changed-By: Patrick Franz <deltaone@debian.org>
Closes: 1005134 1006124
Changes:
 plasma-discover (5.23.5-2) unstable; urgency=medium
 .
   [ Patrick Franz ]
   * Cherry-pick commit to fix the Denial of Service bug in Discover
     (Closes: #1006124).
   * Recommend plasma-discover-backend-fwupd instead of just suggesting
     it such that it gets installed by default (Closes: #1005134).
   * Bump Standards-Version to 4.6.0 (no changes needed).
   * Re-export signing key without extra signatures.
   * Remove redundant B-D.
Checksums-Sha1:
 9d684fbabafc20100484d8adb0f93f5f2bed5dcd 3876 plasma-discover_5.23.5-2.dsc
 b10b9e3f4a9f30ab1dc0c7b9a9d1f98ceb56549b 20412 plasma-discover_5.23.5-2.debian.tar.xz
 2f06f1377de475d4ce1e6368583a4ae6ae6c1bfc 11468 plasma-discover_5.23.5-2_source.buildinfo
Checksums-Sha256:
 3c1cacbd2afd0842d993e86b812f708844f42cf62f9e6ab8699b60e3634936c7 3876 plasma-discover_5.23.5-2.dsc
 6e2bed495906b1f174bf14ba8f8cb7b523d294708846cf06fb990db006ad3f63 20412 plasma-discover_5.23.5-2.debian.tar.xz
 a137b5998c8d4cd0896e8b650186913d008ebc5c715559f104c7360896cfb3bb 11468 plasma-discover_5.23.5-2_source.buildinfo
Files:
 54988cfeeda674f6cdb2ec6f2e3f7b3d 3876 kde optional plasma-discover_5.23.5-2.dsc
 7a2e0b0e531642d1e4945501a16c4072 20412 kde optional plasma-discover_5.23.5-2.debian.tar.xz
 edaba76c3c9b4957b19930d95cdae9ab 11468 kde optional plasma-discover_5.23.5-2_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=TiGQ
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: