[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#988494: marked as done (RFS: ircii/20190117-1+deb10u1 [QA] [RC] -- Internet Relay Chat client)



Your message dated Sat, 29 May 2021 18:09:18 +0200
with message-id <YLJnLtQwRdA7NoD1@isildor.loewenhoehle.ip>
and subject line Re: Bug#988494: RFS: ircii/20190117-1+deb10u1 [QA] [RC] -- Internet Relay Chat client
has caused the Debian Bug report #988494,
regarding RFS: ircii/20190117-1+deb10u1 [QA] [RC] -- Internet Relay Chat client
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
988494: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988494
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: sponsorship-requests
Severity: important

Dear mentors,

I am looking for a sponsor for my package "ircii":

 * Package name    : ircii
   Version         : 20190117-1+deb10u1
   Upstream Author :
 * URL             : http://www.eterna.com.au/ircii/
 * License         : BSD-2-Clause,
MIT-Old-Style-with-legal-disclaimer-2, BSD-3-Clause, Custom,
public-domain, GPL-2.0+
 * Vcs             : https://salsa.debian.org/debian/ircii
   Section         : net

It builds those binary packages:

  ircii - Internet Relay Chat client

To access further information about this package, please visit the
following URL:

  https://mentors.debian.net/package/ircii/

Alternatively, one can download the package with dget using this command:

  dget -x
https://mentors.debian.net/debian/pool/main/i/ircii/ircii_20190117-1+deb10u1.dsc

Changes since the last upload:

 ircii (20190117-1+deb10u1) buster; urgency=medium
 .
   * QA upload.
   * Fix CVE-2021-29376: allows remote attackers to cause a denial of
     service (segmentation fault and client crash, disconnecting
     the victim from an IRC server) via a crafted CTCP UTC message.
     Closes: 986214


I've sent a "buster-pu" mail, which is located here [0]


Regards,
Håvard


[0] https://bugs.debian.org/#988492

--- End Message ---
--- Begin Message ---
On Sat, May 29, 2021 at 03:45:25PM +0000, Håvard Flaget Aasen wrote:
> Control: tags -1 -moreinfo
> 
> Hi Tobias,
(...) 
> The buster-pu bug was approved earlier today.

Uploaded!
Many thanks for your contribution to Debian!

-- 
tobi

Attachment: signature.asc
Description: PGP signature


--- End Message ---

Reply to: