[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#745370: marked as done (ITP: heartbleeder -- test servers for OpenSSL CVE-2014-0160 aka Heartbleed)



Your message dated Tue, 01 Jul 2014 17:00:05 +0000
with message-id <E1X21PZ-0000eO-U4@franck.debian.org>
and subject line Bug#745370: fixed in heartbleeder 0.1.1-1
has caused the Debian Bug report #745370,
regarding ITP: heartbleeder -- test servers for OpenSSL CVE-2014-0160 aka Heartbleed
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
745370: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=745370
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Joao Eriberto Mota Filho <eriberto@eriberto.pro.br>

* Package name    : heartbleeder
  Upstream Author : Jonathan Rudenberg <jonathan@titanous.com>
* URL             : https://github.com/titanous/heartbleeder
* License         : BSD-3-Clause
  Programming Lang: Go (golang)
  Description     : test servers for OpenSSL CVE-2014-0160 aka Heartbleed

 The Heartbleed Bug is a serious vulnerability in the popular OpenSSL
 cryptographic software library. This weakness allows stealing the
 information protected, under normal conditions, by the SSL/TLS
 encryption used to secure the Internet. SSL/TLS provides communication
 security and privacy over the Internet for applications such as web,
 email, instant messaging (IM) and some virtual private networks (VPNs).
 .
 The Heartbleed bug allows anyone on the Internet to read the memory
 of the systems protected by the vulnerable versions of the OpenSSL
 software. This compromises the secret keys used to identify the service
 providers and to encrypt the traffic, the names and passwords of the
 users and the actual content. This allows attackers to eavesdrop on
 communications, steal data directly from the services and users and
 to impersonate services and users.
 .
 heartbleeder is a tool that tests remotely (over a network) if a
 system is compromised by an insecure OpenSSL service.
 .
 More about Heartbleed Bug can be viewed at http://heartbleed.com.

--- End Message ---
--- Begin Message ---
Source: heartbleeder
Source-Version: 0.1.1-1

We believe that the bug you reported is fixed in the latest version of
heartbleeder, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 745370@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joao Eriberto Mota Filho <eriberto@eriberto.pro.br> (supplier of updated heartbleeder package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 20 Apr 2014 18:36:16 -0300
Source: heartbleeder
Binary: heartbleeder
Architecture: source amd64
Version: 0.1.1-1
Distribution: unstable
Urgency: low
Maintainer: pkg-go <pkg-go-maintainers@lists.alioth.debian.org>
Changed-By: Joao Eriberto Mota Filho <eriberto@eriberto.pro.br>
Description:
 heartbleeder - test servers for OpenSSL CVE-2014-0160 aka Heartbleed
Closes: 745370
Changes:
 heartbleeder (0.1.1-1) unstable; urgency=low
 .
   * Initial release (Closes: #745370)
Checksums-Sha1:
 8fc78a5ee4e63305dd13c446e214d317af5f3dd3 2010 heartbleeder_0.1.1-1.dsc
 fa9ca54909509d003dec3d36dfdcc8f198cc122a 129211 heartbleeder_0.1.1.orig.tar.gz
 7f598e58310f0e1cb1279600055a7a8b44039430 3480 heartbleeder_0.1.1-1.debian.tar.xz
 b28b3e924db0d66f5fa9a924a83a6b32b67b12d0 1144870 heartbleeder_0.1.1-1_amd64.deb
Checksums-Sha256:
 de8d0707e95e1649679566218397584fcf26744e0a52d505ab4107b3aa71c295 2010 heartbleeder_0.1.1-1.dsc
 1cc2862ad95888efd99aacaaa3dfe944182d235cb4707fceb01884090dc652b1 129211 heartbleeder_0.1.1.orig.tar.gz
 2948caced87da102ac3019550e201ebcc3e8cd6f6b533aad79c036ac383ea0ab 3480 heartbleeder_0.1.1-1.debian.tar.xz
 61092f8aa8e3c9d772da27ba720cd91ffd8c8a10f2cdf0e816790490f1228bff 1144870 heartbleeder_0.1.1-1_amd64.deb
Files:
 497f2aa85ecb664b6ea7ba8cb81c2698 1144870 net optional heartbleeder_0.1.1-1_amd64.deb
 866928561bb45adf54dc9e003caea7e4 2010 net optional heartbleeder_0.1.1-1.dsc
 20bad98c18b79e5bcec1e02f634ee43e 129211 net optional heartbleeder_0.1.1.orig.tar.gz
 ff0ab5eeb98f40c5652e1a2588a7fd95 3480 net optional heartbleeder_0.1.1-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=Mfau
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: