miniupnpc: CVE-2015-6031: Buffer overflow vulnerability in XML parser functionality

Related Vulnerabilities: CVE-2015-6031  

Debian Bug report logs - #802650
miniupnpc: CVE-2015-6031: Buffer overflow vulnerability in XML parser functionality

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Thu, 22 Oct 2015 06:30:02 UTC

Severity: grave

Tags: fixed-upstream, patch, security, upstream

Found in version miniupnpc/1.5-2

Fixed in versions miniupnpc/1.9.20140610-2.1, miniupnpc/1.9.20140610-2+deb8u1, miniupnpc/1.5-2+deb7u1

Done: Salvatore Bonaccorso <carnil@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Thomas Goirand <zigo@debian.org>:
Bug#802650; Package src:miniupnpc. (Thu, 22 Oct 2015 06:30:05 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Thomas Goirand <zigo@debian.org>. (Thu, 22 Oct 2015 06:30:05 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: miniupnpc: CVE-2015-6031: Buffer overflow vulnerability in XML parser functionality
Date: Thu, 22 Oct 2015 08:26:36 +0200
Source: miniupnpc
Version: 1.5-2
Severity: grave
Tags: security patch upstream fixed-upstream
Justification: user security hole

Hi,

the following vulnerability was published for miniupnpc.

CVE-2015-6031[0]:
Buffer overflow vulnerability in XML parser functionality

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2015-6031
[1] https://github.com/miniupnp/miniupnp/commit/79cca974a4c2ab1199786732a67ff6d898051b78

Regards,
Salvatore



Information forwarded to debian-bugs-dist@lists.debian.org, Thomas Goirand <zigo@debian.org>:
Bug#802650; Package src:miniupnpc. (Thu, 22 Oct 2015 08:30:08 GMT) (full text, mbox, link).


Acknowledgement sent to miniupnp <miniupnp@free.fr>:
Extra info received and forwarded to list. Copy sent to Thomas Goirand <zigo@debian.org>. (Thu, 22 Oct 2015 08:30:08 GMT) (full text, mbox, link).


Message #10 received at 802650@bugs.debian.org (full text, mbox, reply):

From: miniupnp <miniupnp@free.fr>
To: Salvatore Bonaccorso <carnil@debian.org>, 802650@bugs.debian.org, Debian Bug Tracking System <submit@bugs.debian.org>
Subject: Re: Bug#802650: miniupnpc: CVE-2015-6031: Buffer overflow vulnerability in XML parser functionality
Date: Thu, 22 Oct 2015 10:10:18 +0200
[Message part 1 (text/plain, inline)]
Hello,

as you may have noticed, the vulnerability has already been fixed.
Changelog.txt entry is :
/2015/09/15://
//  Fix buffer overflow in igd_desc_parse.c/IGDstartelt()//
//    Discovered by Aleksandar Nikolic of Cisco Talos//
/
The last source code releases on http://miniupnp.free.fr/files/ :
miniupnpc-1.9.20150917.tar.gz
miniupnpc-1.9.20151008.tar.gz
are both fixed.

all previous releases are vulnerable.

Regards,

Thomas


Le 22/10/2015 08:26, Salvatore Bonaccorso a écrit :
> Source: miniupnpc
> Version: 1.5-2
> Severity: grave
> Tags: security patch upstream fixed-upstream
> Justification: user security hole
>
> Hi,
>
> the following vulnerability was published for miniupnpc.
>
> CVE-2015-6031[0]:
> Buffer overflow vulnerability in XML parser functionality
>
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
>
> For further information see:
>
> [0] https://security-tracker.debian.org/tracker/CVE-2015-6031
> [1] https://github.com/miniupnp/miniupnp/commit/79cca974a4c2ab1199786732a67ff6d898051b78
>
> Regards,
> Salvatore
>

[Message part 2 (text/html, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, Thomas Goirand <zigo@debian.org>:
Bug#802650; Package src:miniupnpc. (Thu, 22 Oct 2015 09:30:03 GMT) (full text, mbox, link).


Acknowledgement sent to miniupnp <miniupnp@free.fr>:
Extra info received and forwarded to list. Copy sent to Thomas Goirand <zigo@debian.org>. (Thu, 22 Oct 2015 09:30:03 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org:
Bug#802650; Package src:miniupnpc. (Thu, 22 Oct 2015 21:54:08 GMT) (full text, mbox, link).


Acknowledgement sent to Thomas Goirand <zigo@debian.org>:
Extra info received and forwarded to list. (Thu, 22 Oct 2015 21:54:08 GMT) (full text, mbox, link).


Message #20 received at 802650@bugs.debian.org (full text, mbox, reply):

From: Thomas Goirand <zigo@debian.org>
To: miniupnp <miniupnp@free.fr>, 802650@bugs.debian.org, Salvatore Bonaccorso <carnil@debian.org>
Subject: Re: Bug#802650: miniupnpc: CVE-2015-6031: Buffer overflow vulnerability in XML parser functionality
Date: Thu, 22 Oct 2015 23:52:29 +0200
On 10/22/2015 10:10 AM, miniupnp wrote:
> Hello,
> 
> as you may have noticed, the vulnerability has already been fixed.
> Changelog.txt entry is :
> /2015/09/15://
> //  Fix buffer overflow in igd_desc_parse.c/IGDstartelt()//
> //    Discovered by Aleksandar Nikolic of Cisco Talos//
> /
> The last source code releases on http://miniupnp.free.fr/files/ :
> miniupnpc-1.9.20150917.tar.gz
> miniupnpc-1.9.20151008.tar.gz
> are both fixed.
> 
> all previous releases are vulnerable.
> 
> Regards,
> 
> Thomas

Hi Thomas,

As you know, we need a minimal fix backported for the current version in
Debian Stable. Could you send a patch for that version? The version in
Jessie is: 1.9.20140610. I can upgrade the Sid/Testing version to last
upstream release though.

Cheers,

Thomas Goirand (zigo)




Information forwarded to debian-bugs-dist@lists.debian.org, Thomas Goirand <zigo@debian.org>:
Bug#802650; Package src:miniupnpc. (Thu, 22 Oct 2015 22:21:03 GMT) (full text, mbox, link).


Acknowledgement sent to miniupnp <miniupnp@free.fr>:
Extra info received and forwarded to list. Copy sent to Thomas Goirand <zigo@debian.org>. (Thu, 22 Oct 2015 22:21:03 GMT) (full text, mbox, link).


Message #25 received at 802650@bugs.debian.org (full text, mbox, reply):

From: miniupnp <miniupnp@free.fr>
To: Thomas Goirand <zigo@debian.org>, 802650@bugs.debian.org, Salvatore Bonaccorso <carnil@debian.org>
Subject: Re: Bug#802650: miniupnpc: CVE-2015-6031: Buffer overflow vulnerability in XML parser functionality
Date: Fri, 23 Oct 2015 00:18:57 +0200
Doesn't the following patch apply ?

https://github.com/miniupnp/miniupnp/commit/79cca974a4c2ab1199786732a67ff6d898051b78

I think it applies properly on all release since at least 1.5, maybe even before.


Le 22/10/2015 23:52, Thomas Goirand a écrit :
> On 10/22/2015 10:10 AM, miniupnp wrote:
>> Hello,
>>
>> as you may have noticed, the vulnerability has already been fixed.
>> Changelog.txt entry is :
>> /2015/09/15://
>> //  Fix buffer overflow in igd_desc_parse.c/IGDstartelt()//
>> //    Discovered by Aleksandar Nikolic of Cisco Talos//
>> /
>> The last source code releases on http://miniupnp.free.fr/files/ :
>> miniupnpc-1.9.20150917.tar.gz
>> miniupnpc-1.9.20151008.tar.gz
>> are both fixed.
>>
>> all previous releases are vulnerable.
>>
>> Regards,
>>
>> Thomas
> Hi Thomas,
>
> As you know, we need a minimal fix backported for the current version in
> Debian Stable. Could you send a patch for that version? The version in
> Jessie is: 1.9.20140610. I can upgrade the Sid/Testing version to last
> upstream release though.
>
> Cheers,
>
> Thomas Goirand (zigo)
>




Information forwarded to debian-bugs-dist@lists.debian.org, Thomas Goirand <zigo@debian.org>:
Bug#802650; Package src:miniupnpc. (Sun, 25 Oct 2015 07:15:03 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Thomas Goirand <zigo@debian.org>. (Sun, 25 Oct 2015 07:15:03 GMT) (full text, mbox, link).


Message #30 received at 802650@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: miniupnp <miniupnp@free.fr>, 802650@bugs.debian.org
Cc: Thomas Goirand <zigo@debian.org>
Subject: Re: Bug#802650: miniupnpc: CVE-2015-6031: Buffer overflow vulnerability in XML parser functionality
Date: Sun, 25 Oct 2015 08:11:46 +0100
[Message part 1 (text/plain, inline)]
Hi Thomas, and Thomas,

On Fri, Oct 23, 2015 at 12:18:57AM +0200, miniupnp wrote:
> Doesn't the following patch apply ?
> 
> https://github.com/miniupnp/miniupnp/commit/79cca974a4c2ab1199786732a67ff6d898051b78
> 
> I think it applies properly on all release since at least 1.5, maybe even before.

I now uploaded the attached debdiffs to security-master to be released
in a DSA. I can prepare -- if needed -- as well a NMU for sid, but
just applying the patch. I guess though it would be better to go just
for a new upstream version there.

Regards,
Salvatore
[miniupnpc_1.5-2+deb7u1.debdiff (text/plain, attachment)]
[miniupnpc_1.9.20140610-2+deb8u1.debdiff (text/plain, attachment)]
[signature.asc (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, Thomas Goirand <zigo@debian.org>:
Bug#802650; Package src:miniupnpc. (Sun, 25 Oct 2015 12:51:04 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Thomas Goirand <zigo@debian.org>. (Sun, 25 Oct 2015 12:51:04 GMT) (full text, mbox, link).


Message #35 received at 802650@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: 802650@bugs.debian.org
Cc: miniupnp <miniupnp@free.fr>, Thomas Goirand <zigo@debian.org>
Subject: Re: Bug#802650: miniupnpc: CVE-2015-6031: Buffer overflow vulnerability in XML parser functionality
Date: Sun, 25 Oct 2015 13:46:26 +0100
[Message part 1 (text/plain, inline)]
Hi Thomas,

Attached is debdiff for a proposed NMU to unstable as well (not yet
uploaded to delayed queue). Do you plan to do the upload? Otherwise I
can do the NMU.

Regards,
Salvatore
[miniupnpc_1.9.20140610-2.1.debdiff (text/plain, attachment)]

Information forwarded to debian-bugs-dist@lists.debian.org, Thomas Goirand <zigo@debian.org>:
Bug#802650; Package src:miniupnpc. (Mon, 26 Oct 2015 16:39:10 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Thomas Goirand <zigo@debian.org>. (Mon, 26 Oct 2015 16:39:10 GMT) (full text, mbox, link).


Message #40 received at 802650@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: 802650@bugs.debian.org
Subject: miniupnpc: diff for NMU version 1.9.20140610-2.1
Date: Mon, 26 Oct 2015 17:35:38 +0100
[Message part 1 (text/plain, inline)]
Control: tags 802650 + pending

Hi Thomas,

I've prepared an NMU for miniupnpc (versioned as 1.9.20140610-2.1) and
uploaded it to DELAYED/2. Please feel free to tell me if I
should delay it longer.

Regards,
Salvatore
[miniupnpc-1.9.20140610-2.1-nmu.diff (text/x-diff, attachment)]

Added tag(s) pending. Request was from Salvatore Bonaccorso <carnil@debian.org> to 802650-submit@bugs.debian.org. (Mon, 26 Oct 2015 16:39:10 GMT) (full text, mbox, link).


Reply sent to Salvatore Bonaccorso <carnil@debian.org>:
You have taken responsibility. (Tue, 27 Oct 2015 17:36:10 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Tue, 27 Oct 2015 17:36:10 GMT) (full text, mbox, link).


Message #47 received at 802650-close@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: 802650-close@bugs.debian.org
Subject: Bug#802650: fixed in miniupnpc 1.9.20140610-2.1
Date: Tue, 27 Oct 2015 17:33:59 +0000
Source: miniupnpc
Source-Version: 1.9.20140610-2.1

We believe that the bug you reported is fixed in the latest version of
miniupnpc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 802650@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <carnil@debian.org> (supplier of updated miniupnpc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 25 Oct 2015 13:41:21 +0100
Source: miniupnpc
Binary: miniupnpc libminiupnpc10 libminiupnpc-dev python-miniupnpc
Architecture: source
Version: 1.9.20140610-2.1
Distribution: unstable
Urgency: high
Maintainer: Thomas Goirand <zigo@debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Closes: 802650
Description: 
 libminiupnpc-dev - UPnP IGD client lightweight library development files
 libminiupnpc10 - UPnP IGD client lightweight library
 miniupnpc  - UPnP IGD client lightweight library client
 python-miniupnpc - UPnP IGD client lightweight library Python bindings
Changes:
 miniupnpc (1.9.20140610-2.1) unstable; urgency=high
 .
   * Non-maintainer upload.
   * Add CVE-2015-6031.patch patch.
     CVE-2015-6031: Buffer overflow vulnerability in XML parser
     functionality. (Closes: #802650)
Checksums-Sha1: 
 a7bc5553eb59635f2a2423cc289025f7dd17c267 2101 miniupnpc_1.9.20140610-2.1.dsc
 5751dce0e0e57bba6ce6610ad68c0efad5c9796e 6536 miniupnpc_1.9.20140610-2.1.debian.tar.xz
Checksums-Sha256: 
 c7a3b1bda0d6952d1701cc1887a8bf1e2812528b7116d54bbcce9ed32021b40e 2101 miniupnpc_1.9.20140610-2.1.dsc
 8cfb387b2211b60a972a397047f8d5906de340efd74bfd5841fe072d2d4752b6 6536 miniupnpc_1.9.20140610-2.1.debian.tar.xz
Files: 
 80d534e474897c3b600b14d9ad4aaec2 2101 net optional miniupnpc_1.9.20140610-2.1.dsc
 4282ef8e85f73252d4ea6f5d0b874baf 6536 net optional miniupnpc_1.9.20140610-2.1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=un+6
-----END PGP SIGNATURE-----




Reply sent to Salvatore Bonaccorso <carnil@debian.org>:
You have taken responsibility. (Tue, 27 Oct 2015 21:21:27 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Tue, 27 Oct 2015 21:21:28 GMT) (full text, mbox, link).


Message #52 received at 802650-close@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: 802650-close@bugs.debian.org
Subject: Bug#802650: fixed in miniupnpc 1.9.20140610-2+deb8u1
Date: Tue, 27 Oct 2015 21:20:02 +0000
Source: miniupnpc
Source-Version: 1.9.20140610-2+deb8u1

We believe that the bug you reported is fixed in the latest version of
miniupnpc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 802650@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <carnil@debian.org> (supplier of updated miniupnpc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 25 Oct 2015 07:49:17 +0100
Source: miniupnpc
Binary: miniupnpc libminiupnpc10 libminiupnpc-dev python-miniupnpc
Architecture: source
Version: 1.9.20140610-2+deb8u1
Distribution: jessie-security
Urgency: high
Maintainer: Thomas Goirand <zigo@debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Closes: 802650
Description: 
 libminiupnpc-dev - UPnP IGD client lightweight library development files
 libminiupnpc10 - UPnP IGD client lightweight library
 miniupnpc  - UPnP IGD client lightweight library client
 python-miniupnpc - UPnP IGD client lightweight library Python bindings
Changes:
 miniupnpc (1.9.20140610-2+deb8u1) jessie-security; urgency=high
 .
   * Non-maintainer upload by the Security Team.
   * Add CVE-2015-6031.patch patch.
     CVE-2015-6031: Buffer overflow vulnerability in XML parser
     functionality. (Closes: #802650)
Checksums-Sha1: 
 3eebe316498e3045120e1e365d777efff05ea6af 2121 miniupnpc_1.9.20140610-2+deb8u1.dsc
 cd7f300d71019dfb915b79d1ea701d163d778c5b 76674 miniupnpc_1.9.20140610.orig.tar.gz
 e11483de62f464cada2ec8b249d11143cccd0be1 6568 miniupnpc_1.9.20140610-2+deb8u1.debian.tar.xz
Checksums-Sha256: 
 896d1185780778644f62c261e0ab78cefbbaa8ca1924de5c40c12da84e0bc3a8 2121 miniupnpc_1.9.20140610-2+deb8u1.dsc
 31beffe44a5d7b7bbad3729cdd6f9f85844b9e5771aebb56550f87cbedcf5d3b 76674 miniupnpc_1.9.20140610.orig.tar.gz
 f11579aafe66aacfeba7e3e3df386f49dbf14a29fe2b40fb165cf6d0325c5ed6 6568 miniupnpc_1.9.20140610-2+deb8u1.debian.tar.xz
Files: 
 bd6b059e690592b52f16223614d38e37 2121 net optional miniupnpc_1.9.20140610-2+deb8u1.dsc
 6a812904b1a84766d03825341fc17365 76674 net optional miniupnpc_1.9.20140610.orig.tar.gz
 eced304501de6207082dff9df28253de 6568 net optional miniupnpc_1.9.20140610-2+deb8u1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=oM+O
-----END PGP SIGNATURE-----




Reply sent to Salvatore Bonaccorso <carnil@debian.org>:
You have taken responsibility. (Tue, 27 Oct 2015 21:27:12 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Tue, 27 Oct 2015 21:27:12 GMT) (full text, mbox, link).


Message #57 received at 802650-close@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: 802650-close@bugs.debian.org
Subject: Bug#802650: fixed in miniupnpc 1.5-2+deb7u1
Date: Tue, 27 Oct 2015 21:23:08 +0000
Source: miniupnpc
Source-Version: 1.5-2+deb7u1

We believe that the bug you reported is fixed in the latest version of
miniupnpc, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 802650@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <carnil@debian.org> (supplier of updated miniupnpc package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 25 Oct 2015 07:35:29 +0100
Source: miniupnpc
Binary: miniupnpc libminiupnpc5 libminiupnpc-dev
Architecture: source amd64
Version: 1.5-2+deb7u1
Distribution: wheezy-security
Urgency: high
Maintainer: Thomas Goirand <zigo@debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Description: 
 libminiupnpc-dev - UPnP IGD client lightweight library development files
 libminiupnpc5 - UPnP IGD client lightweight library
 miniupnpc  - UPnP IGD client lightweight library client
Closes: 802650
Changes: 
 miniupnpc (1.5-2+deb7u1) wheezy-security; urgency=high
 .
   * Non-maintainer upload by the Security Team.
   * CVE-2015-6031: Buffer overflow vulnerability in XML parser functionality
     (Closes: #802650)
Checksums-Sha1: 
 6901fbb4fd914d756f75b8a6e5374a035755a0e2 1905 miniupnpc_1.5-2+deb7u1.dsc
 53ceae5515a547fed28b93bd5abba517586b0b3e 53309 miniupnpc_1.5.orig.tar.gz
 b8256818cdf1f1bbd2a13a453631b879fa0e95c1 3520 miniupnpc_1.5-2+deb7u1.diff.gz
 405c0d4a4365761a766ea9580f576fde1e66d939 14216 miniupnpc_1.5-2+deb7u1_amd64.deb
 3377cb5b10a70ef0b7de014cdd4981675a8aeba5 35140 libminiupnpc5_1.5-2+deb7u1_amd64.deb
 4b71a78893ddf787b04ac24e09641924902708de 12014 libminiupnpc-dev_1.5-2+deb7u1_amd64.deb
Checksums-Sha256: 
 6a977d6110a13670e09cf6ef19538ccfc1a07e4e8ad101372cc8a3de30f58367 1905 miniupnpc_1.5-2+deb7u1.dsc
 440f0e64e92c92c6624f49d21cf8279b9c05afe99261e4add357b2ee2828a957 53309 miniupnpc_1.5.orig.tar.gz
 e873c1133f45bead520cba0caa177e9b935363bf8980aea9e73413975c4a94f3 3520 miniupnpc_1.5-2+deb7u1.diff.gz
 7a32f87df6b503da0a7132fa1faabeb020ef1d0f49ed6747bea3039e6890521c 14216 miniupnpc_1.5-2+deb7u1_amd64.deb
 439729b5278eebc8f09a41ad6bdea4633f575fa8f52eaa35c64e01aaa97c64ea 35140 libminiupnpc5_1.5-2+deb7u1_amd64.deb
 800415d2c93765bbbac3dfb4585d1bc9dc0f66f8bc5ca917b34d0093d15680a8 12014 libminiupnpc-dev_1.5-2+deb7u1_amd64.deb
Files: 
 eec432c1f539b5a62756a25e04da227d 1905 net optional miniupnpc_1.5-2+deb7u1.dsc
 0efa7498d27c82a56a0300b0c05c4f58 53309 net optional miniupnpc_1.5.orig.tar.gz
 cc7a80528bb15e5485e10e30ebb322d8 3520 net optional miniupnpc_1.5-2+deb7u1.diff.gz
 dc0967a0db949a57d398811233666c0b 14216 net optional miniupnpc_1.5-2+deb7u1_amd64.deb
 211e5c79641e78c05535acb9bc25bde9 35140 net optional libminiupnpc5_1.5-2+deb7u1_amd64.deb
 8644a2e50f2ed83b013f0f2e9a92b1a3 12014 libdevel optional libminiupnpc-dev_1.5-2+deb7u1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCgAGBQJWLH9qAAoJEAVMuPMTQ89EG5AP/3ztHuFVgPjiZmvwnaT84ckm
Z4g+ARcVm31cIU0zHh9MfVaygE98jM6ZBS+Hpc50eQMdxG27n7GoBf1r5flxFQJ7
NJuMEQYwsol3lK7RAy/snP2Wjfz8F/75ij1Tgqquu/hSqOyV1ex4JBDz5W9YSf7G
rCNlt0J2mDUhCJy1JWE2lZXwRTkhpNNTnojudyAgbFeZHIs1Do9/My2Tt59ARCG8
NFsuyTKgPGjDXxen6fKtK9AEjppINMsJHA89lEOar1eZxnwsZcHxLSlU4o0tgj/R
6jJ4sCysnLxavoAXJbxXCzfX+CWZFoBndkKqM6dznOi6On1XCkSuEIzwtBChWsMH
JLXIsEAALU0y6YXd/i6vTsDV1HxIbJdHMiQZvZnhTqatEFzH/Dn4zfYPE/D36/+l
4IUPmLe35zsC7uNg7hPafuVvqDQMeJNs1WAqFE5lkytwpcJt+fMQgWQka3c+126A
fTUP7gk26ZG7M8maJtbInjTZWB9Nd1uT1ngaOi5oZAYvHTsny8Txqnr6JkdfFF8C
4ouTrwXI11+BDoZHgliixbcZarh4m7lwxrl2q0VdTAgM6Do1Cvia7tEjVQ1Ayg9g
Oy+QFxomJuMBtY9vSIqEIFbxmg0V+qO3gl5uLwCmiS5vlQ/6R2f0k5uGYYSq1U/a
Ib4hfKZHMQKdQ2xoOBmj
=4aeq
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sun, 24 Jan 2016 07:32:05 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 12:59:28 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.