Report forwarded
to debian-bugs-dist@lists.debian.org, Tristan Seligmann <mithrandi@debian.org>: Bug#921688; Package electrum.
(Thu, 07 Feb 2019 23:45:05 GMT) (full text, mbox, link).
Acknowledgement sent
to darknetwhiteknight <darknetwhiteknight@riseup.net>:
New Bug report received and forwarded. Copy sent to Tristan Seligmann <mithrandi@debian.org>.
(Thu, 07 Feb 2019 23:45:05 GMT) (full text, mbox, link).
Package: electrum
Version: 3.1.3-1~bpo9+1
When electrum connects to certain malicious servers they issue a warning
message telling the user to upgrade by following a phishing link. The
link prompts the user to enter their credentials and install malware
which results in the loss of all their funds. A new version of electrum
has been realeased to address these problems.
The issue is being discussed here:
https://github.com/spesmilo/electrum/issues/4968 complete with
screenshots of the phishing messages.
Given the severity and urgency of this exploit, the appropriate new
version should be added to the official Debian repos ASAP to avoid
further attacks on users.
I am using Debian GNU/Linux 9 (stretch) 64-bit
Kernel 4.9.0-8-amd64
Information forwarded
to debian-bugs-dist@lists.debian.org, Tristan Seligmann <mithrandi@debian.org>: Bug#921688; Package electrum.
(Wed, 20 Feb 2019 18:24:12 GMT) (full text, mbox, link).
Acknowledgement sent
to Vincas Dargis <vindrg@gmail.com>:
Extra info received and forwarded to list. Copy sent to Tristan Seligmann <mithrandi@debian.org>.
(Wed, 20 Feb 2019 18:24:12 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Tristan Seligmann <mithrandi@debian.org>: Bug#921688; Package electrum.
(Sun, 17 Mar 2019 09:27:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Vincas Dargis <vindrg@gmail.com>:
Extra info received and forwarded to list. Copy sent to Tristan Seligmann <mithrandi@debian.org>.
(Sun, 17 Mar 2019 09:27:03 GMT) (full text, mbox, link).
Control: severity -1 serious
From electrum.org:
"Warning: Electrum versions older than 3.3 can no longer connect to public servers, and must be
upgraded."
Electrum in Debian no longer "syncs", servers does not provide information for this version. It's
unusable, unless you install older electrumx server by yourself, and it is not available in Debian.
Severity set to 'serious' from 'normal'
Request was from Vincas Dargis <vindrg@gmail.com>
to 921688-submit@bugs.debian.org.
(Sun, 17 Mar 2019 09:27:03 GMT) (full text, mbox, link).
Merged 921688923595
Request was from Laurent Bigonville <bigon@debian.org>
to control@bugs.debian.org.
(Wed, 27 Mar 2019 22:09:03 GMT) (full text, mbox, link).
Marked as found in versions electrum/3.2.3-1.
Request was from Laurent Bigonville <bigon@debian.org>
to control@bugs.debian.org.
(Wed, 27 Mar 2019 22:09:05 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Tristan Seligmann <mithrandi@debian.org>: Bug#921688; Package electrum.
(Sat, 06 Apr 2019 08:39:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Ivan <ivan@vershinin.net>:
Extra info received and forwarded to list. Copy sent to Tristan Seligmann <mithrandi@debian.org>.
(Sat, 06 Apr 2019 08:39:03 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Tristan Seligmann <mithrandi@debian.org>: Bug#921688; Package electrum.
(Thu, 18 Apr 2019 01:33:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Joey Hess <id@joeyh.name>:
Extra info received and forwarded to list. Copy sent to Tristan Seligmann <mithrandi@debian.org>.
(Thu, 18 Apr 2019 01:33:03 GMT) (full text, mbox, link).
This is still happening, the legitimate public servers may not work with
electrum 3.3, but there are dozens of rogue servers that do and that are
exploiting this bug.
--
see shy jo
Severity set to 'critical' from 'serious'
Request was from Sam Hartman <hartmans@debian.org>
to control@bugs.debian.org.
(Tue, 30 Apr 2019 14:57:26 GMT) (full text, mbox, link).
Added tag(s) security.
Request was from Sam Hartman <hartmans@debian.org>
to control@bugs.debian.org.
(Tue, 30 Apr 2019 14:57:28 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Tristan Seligmann <mithrandi@debian.org>: Bug#921688; Package electrum.
(Tue, 30 Apr 2019 15:03:02 GMT) (full text, mbox, link).
Acknowledgement sent
to Sam Hartman <leader@debian.org>:
Extra info received and forwarded to list. Copy sent to Tristan Seligmann <mithrandi@debian.org>.
(Tue, 30 Apr 2019 15:03:02 GMT) (full text, mbox, link).
I realize that we normally don't care about packages only in sid, but
the version of electrum in sid is apparently only useful to funnel your
bitcoin to attackers.
The issue is that versions prior to 3.3 are vulnerable to mallware, and
as a result all the public servers refuse to talk to the version in sid,
but rogue servers are happy to take your credentials and money.
The maintainer has not addressed this bug since Feb 7.
I don't have time to go look into the package and upgrade before leaving
on a trip tomorrow.
If we can't get this fixed really quick would ftpmaster accept a request
to remove the package?
--Sam
Information forwarded
to debian-bugs-dist@lists.debian.org, Tristan Seligmann <mithrandi@debian.org>: Bug#921688; Package electrum.
(Tue, 30 Apr 2019 21:45:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Joerg Jaspert <joerg@ganneff.de>:
Extra info received and forwarded to list. Copy sent to Tristan Seligmann <mithrandi@debian.org>.
(Tue, 30 Apr 2019 21:45:03 GMT) (full text, mbox, link).
To: Sam Hartman <leader@debian.org>, security@debian.org, ftpmaster@debian.org
Cc: 921688@bugs.debian.org
Subject: Re: electrum being actively used for phishing
Date: Tue, 30 Apr 2019 23:33:23 +0200
On 15388 March 1977, Sam Hartman wrote:
> If we can't get this fixed really quick would ftpmaster accept a request
> to remove the package?
Yes.
--
bye, Joerg
Information forwarded
to debian-bugs-dist@lists.debian.org, Tristan Seligmann <mithrandi@debian.org>: Bug#921688; Package electrum.
(Wed, 01 May 2019 10:42:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Laurent Bigonville <bigon@debian.org>:
Extra info received and forwarded to list. Copy sent to Tristan Seligmann <mithrandi@debian.org>.
(Wed, 01 May 2019 10:42:03 GMT) (full text, mbox, link).
To: Sam Hartman <leader@debian.org>, security@debian.org
Cc: 921688@bugs.debian.org
Subject: Re: electrum being actively used for phishing
Date: Wed, 1 May 2019 12:40:18 +0200
On Tue, 30 Apr 2019 10:59:16 -0400 Sam Hartman <leader@debian.org> wrote:
>
> I realize that we normally don't care about packages only in sid, but
> the version of electrum in sid is apparently only useful to funnel your
> bitcoin to attackers.
> The issue is that versions prior to 3.3 are vulnerable to mallware, and
> as a result all the public servers refuse to talk to the version in sid,
> but rogue servers are happy to take your credentials and money.
>
> The maintainer has not addressed this bug since Feb 7.
>
> I don't have time to go look into the package and upgrade before leaving
> on a trip tomorrow.
>
> If we can't get this fixed really quick would ftpmaster accept a request
> to remove the package?
>
FTR, I looked at 3.3.4 and it requires 2 new python modules that are not
yet in the archive: aiohttp_socks and aiorpcx
My work on the package is at https://salsa.debian.org/bigon/electrum
Added tag(s) fixed-upstream.
Request was from debian-bts-link@lists.debian.org
to control@bugs.debian.org.
(Mon, 06 May 2019 19:30:07 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Tristan Seligmann <mithrandi@debian.org>: Bug#921688; Package electrum.
(Tue, 07 May 2019 02:30:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Sam Hartman <hartmans@debian.org>:
Extra info received and forwarded to list. Copy sent to Tristan Seligmann <mithrandi@debian.org>.
(Tue, 07 May 2019 02:30:04 GMT) (full text, mbox, link).
Dear maintainer.
I made the following 0-day NMU of electrum.
I suspect that once you update to a new version you will not wish to
include these changes, but in the interest of awareness of your package
I wanted to make sure you were aware.
diff --git a/debian/changelog b/debian/changelog
index 4aaaaff..c30a279 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,12 @@
+electrum (3.2.3-1.1) unstable; urgency=medium
+
+ * Non-maintainer upload.
+ * On startup print a warning that this version in insecure and then
+ exit, Closes: #928518
+
+
+ -- Sam Hartman <hartmans@debian.org> Mon, 06 May 2019 22:11:19 -0400
+
electrum (3.2.3-1) unstable; urgency=medium
* New upstream release.
diff --git a/debian/patches/replace-with-security-warning.patch b/debian/patches/replace-with-security-warning.patch
new file mode 100644
index 0000000..e8f409e
--- /dev/null
+++ b/debian/patches/replace-with-security-warning.patch
@@ -0,0 +1,60 @@
+From: Sam Hartman <hartmans@debian.org>
+Date: Mon, 6 May 2019 22:10:51 -0400
+X-Dgit-Generated: 3.2.3-1.1 3afceceac2d1042645e470189c13edb4f965e7a9
+Subject: Replace with security warning
+
+On startup print to GUI and stdio a security warning and then exit.
+
+---
+
+--- electrum-3.2.3.orig/electrum/electrum
++++ electrum-3.2.3/electrum/electrum
+@@ -1,4 +1,4 @@
+-#!/usr/bin/env python3
++#!/usr/bin/python3
+ # -*- mode: python -*-
+ #
+ # Electrum - lightweight Bitcoin client
+@@ -30,13 +30,42 @@ script_dir = os.path.dirname(os.path.rea
+ is_bundle = getattr(sys, 'frozen', False)
+ is_local = not is_bundle and os.path.exists(os.path.join(script_dir, "electrum.desktop"))
+ is_android = 'ANDROID_DATA' in os.environ
++try:
++ import PyQt5
++except Exception:
++ sys.exit("Error: Could not import PyQt5 on Linux systems, you may try 'sudo apt-get install python3-pyqt5'")
+
++from PyQt5.QtGui import *
++from PyQt5.QtWidgets import *
++from PyQt5.QtCore import *
++import PyQt5.QtCore as QtCore
+ # move this back to gui/kivy/__init.py once plugins are moved
+ os.environ['KIVY_DATA_DIR'] = os.path.abspath(os.path.dirname(__file__)) + '/electrum/gui/kivy/data/'
+
+ if is_local or is_android:
+ sys.path.insert(0, os.path.join(script_dir, 'packages'))
+
++security_message = ''' \
++This version of Electrum is vulnerable to malicious code inserted by
++attackers and is being actively exploited to try and convince users to
++give their private credentials to attackers. See
++https://bugs.debian.org/921688 for details. Until the version in
++Debian is updated, please see https://electrum.org/download.html
++'''
++sys.stderr.write(security_message)
++
++
++from electrum.gui.qt.util import MessageBoxMixin
++class Window(QMainWindow, MessageBoxMixin):
++
++ def __init__(self, *args, **kwargs):
++ super().__init__(*args, **kwargs)
++ self.show_warning(msg = security_message, title = "THIS APPLICATION is INSECURE")
++
++
++app = QApplication(["electrum", "gui"])
++window = Window()
++sys.exit(2)
+
+ def check_imports():
+ # pure-python dependencies need to be imported here for pyinstaller
diff --git a/debian/patches/series b/debian/patches/series
new file mode 100644
index 0000000..8ffe66a
--- /dev/null
+++ b/debian/patches/series
@@ -0,0 +1 @@
+replace-with-security-warning.patch
diff --git a/electrum/electrum b/electrum/electrum
index dd35c35..8c5ef37 100755
--- a/electrum/electrum
+++ b/electrum/electrum
@@ -1,4 +1,4 @@
-#!/usr/bin/env python3
+#!/usr/bin/python3
# -*- mode: python -*-
#
# Electrum - lightweight Bitcoin client
@@ -30,13 +30,42 @@ script_dir = os.path.dirname(os.path.realpath(__file__))
is_bundle = getattr(sys, 'frozen', False)
is_local = not is_bundle and os.path.exists(os.path.join(script_dir, "electrum.desktop"))
is_android = 'ANDROID_DATA' in os.environ
-
+try:
+ import PyQt5
+except Exception:
+ sys.exit("Error: Could not import PyQt5 on Linux systems, you may try 'sudo apt-get install python3-pyqt5'")
+
+from PyQt5.QtGui import *
+from PyQt5.QtWidgets import *
+from PyQt5.QtCore import *
+import PyQt5.QtCore as QtCore
# move this back to gui/kivy/__init.py once plugins are moved
os.environ['KIVY_DATA_DIR'] = os.path.abspath(os.path.dirname(__file__)) + '/electrum/gui/kivy/data/'
if is_local or is_android:
sys.path.insert(0, os.path.join(script_dir, 'packages'))
+security_message = ''' \
+This version of Electrum is vulnerable to malicious code inserted by
+attackers and is being actively exploited to try and convince users to
+give their private credentials to attackers. See
+https://bugs.debian.org/921688 for details. Until the version in
+Debian is updated, please see https://electrum.org/download.html
+'''
+sys.stderr.write(security_message)
+
+
+from electrum.gui.qt.util import MessageBoxMixin
+class Window(QMainWindow, MessageBoxMixin):
+
+ def __init__(self, *args, **kwargs):
+ super().__init__(*args, **kwargs)
+ self.show_warning(msg = security_message, title = "THIS APPLICATION is INSECURE")
+
+
+app = QApplication(["electrum", "gui"])
+window = Window()
+sys.exit(2)
def check_imports():
# pure-python dependencies need to be imported here for pyinstaller
Information forwarded
to debian-bugs-dist@lists.debian.org, Tristan Seligmann <mithrandi@debian.org>: Bug#921688; Package electrum.
(Tue, 07 May 2019 08:21:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Tristan Seligmann <mithrandi@mithrandi.net>:
Extra info received and forwarded to list. Copy sent to Tristan Seligmann <mithrandi@debian.org>.
(Tue, 07 May 2019 08:21:03 GMT) (full text, mbox, link).
Thank you for taking care of this; I plan to package a new upstream version
when I can, but the need to package new dependencies makes this non-trivial
and due to personal circumstances I have not yet had the opportunity to
handle this.
On Tue, 7 May 2019 at 04:30, Sam Hartman <hartmans@debian.org> wrote:
>
> Dear maintainer.
> I made the following 0-day NMU of electrum.
> I suspect that once you update to a new version you will not wish to
> include these changes, but in the interest of awareness of your package
> I wanted to make sure you were aware.
>
> diff --git a/debian/changelog b/debian/changelog
> index 4aaaaff..c30a279 100644
> --- a/debian/changelog
> +++ b/debian/changelog
> @@ -1,3 +1,12 @@
> +electrum (3.2.3-1.1) unstable; urgency=medium
> +
> + * Non-maintainer upload.
> + * On startup print a warning that this version in insecure and then
> + exit, Closes: #928518
> +
> +
> + -- Sam Hartman <hartmans@debian.org> Mon, 06 May 2019 22:11:19 -0400
> +
> electrum (3.2.3-1) unstable; urgency=medium
>
> * New upstream release.
> diff --git a/debian/patches/replace-with-security-warning.patch
> b/debian/patches/replace-with-security-warning.patch
> new file mode 100644
> index 0000000..e8f409e
> --- /dev/null
> +++ b/debian/patches/replace-with-security-warning.patch
> @@ -0,0 +1,60 @@
> +From: Sam Hartman <hartmans@debian.org>
> +Date: Mon, 6 May 2019 22:10:51 -0400
> +X-Dgit-Generated: 3.2.3-1.1 3afceceac2d1042645e470189c13edb4f965e7a9
> +Subject: Replace with security warning
> +
> +On startup print to GUI and stdio a security warning and then exit.
> +
> +---
> +
> +--- electrum-3.2.3.orig/electrum/electrum
> ++++ electrum-3.2.3/electrum/electrum
> +@@ -1,4 +1,4 @@
> +-#!/usr/bin/env python3
> ++#!/usr/bin/python3
> + # -*- mode: python -*-
> + #
> + # Electrum - lightweight Bitcoin client
> +@@ -30,13 +30,42 @@ script_dir = os.path.dirname(os.path.rea
> + is_bundle = getattr(sys, 'frozen', False)
> + is_local = not is_bundle and os.path.exists(os.path.join(script_dir,
> "electrum.desktop"))
> + is_android = 'ANDROID_DATA' in os.environ
> ++try:
> ++ import PyQt5
> ++except Exception:
> ++ sys.exit("Error: Could not import PyQt5 on Linux systems, you may
> try 'sudo apt-get install python3-pyqt5'")
> +
> ++from PyQt5.QtGui import *
> ++from PyQt5.QtWidgets import *
> ++from PyQt5.QtCore import *
> ++import PyQt5.QtCore as QtCore
> + # move this back to gui/kivy/__init.py once plugins are moved
> + os.environ['KIVY_DATA_DIR'] = os.path.abspath(os.path.dirname(__file__))
> + '/electrum/gui/kivy/data/'
> +
> + if is_local or is_android:
> + sys.path.insert(0, os.path.join(script_dir, 'packages'))
> +
> ++security_message = ''' \
> ++This version of Electrum is vulnerable to malicious code inserted by
> ++attackers and is being actively exploited to try and convince users to
> ++give their private credentials to attackers. See
> ++https://bugs.debian.org/921688 for details. Until the version in
> ++Debian is updated, please see https://electrum.org/download.html
> ++'''
> ++sys.stderr.write(security_message)
> ++
> ++
> ++from electrum.gui.qt.util import MessageBoxMixin
> ++class Window(QMainWindow, MessageBoxMixin):
> ++
> ++ def __init__(self, *args, **kwargs):
> ++ super().__init__(*args, **kwargs)
> ++ self.show_warning(msg = security_message, title = "THIS
> APPLICATION is INSECURE")
> ++
> ++
> ++app = QApplication(["electrum", "gui"])
> ++window = Window()
> ++sys.exit(2)
> +
> + def check_imports():
> + # pure-python dependencies need to be imported here for pyinstaller
> diff --git a/debian/patches/series b/debian/patches/series
> new file mode 100644
> index 0000000..8ffe66a
> --- /dev/null
> +++ b/debian/patches/series
> @@ -0,0 +1 @@
> +replace-with-security-warning.patch
> diff --git a/electrum/electrum b/electrum/electrum
> index dd35c35..8c5ef37 100755
> --- a/electrum/electrum
> +++ b/electrum/electrum
> @@ -1,4 +1,4 @@
> -#!/usr/bin/env python3
> +#!/usr/bin/python3
> # -*- mode: python -*-
> #
> # Electrum - lightweight Bitcoin client
> @@ -30,13 +30,42 @@ script_dir =
> os.path.dirname(os.path.realpath(__file__))
> is_bundle = getattr(sys, 'frozen', False)
> is_local = not is_bundle and os.path.exists(os.path.join(script_dir,
> "electrum.desktop"))
> is_android = 'ANDROID_DATA' in os.environ
> -
> +try:
> + import PyQt5
> +except Exception:
> + sys.exit("Error: Could not import PyQt5 on Linux systems, you may try
> 'sudo apt-get install python3-pyqt5'")
> +
> +from PyQt5.QtGui import *
> +from PyQt5.QtWidgets import *
> +from PyQt5.QtCore import *
> +import PyQt5.QtCore as QtCore
> # move this back to gui/kivy/__init.py once plugins are moved
> os.environ['KIVY_DATA_DIR'] = os.path.abspath(os.path.dirname(__file__))
> + '/electrum/gui/kivy/data/'
>
> if is_local or is_android:
> sys.path.insert(0, os.path.join(script_dir, 'packages'))
>
> +security_message = ''' \
> +This version of Electrum is vulnerable to malicious code inserted by
> +attackers and is being actively exploited to try and convince users to
> +give their private credentials to attackers. See
> +https://bugs.debian.org/921688 for details. Until the version in
> +Debian is updated, please see https://electrum.org/download.html
> +'''
> +sys.stderr.write(security_message)
> +
> +
> +from electrum.gui.qt.util import MessageBoxMixin
> +class Window(QMainWindow, MessageBoxMixin):
> +
> + def __init__(self, *args, **kwargs):
> + super().__init__(*args, **kwargs)
> + self.show_warning(msg = security_message, title = "THIS
> APPLICATION is INSECURE")
> +
> +
> +app = QApplication(["electrum", "gui"])
> +window = Window()
> +sys.exit(2)
>
> def check_imports():
> # pure-python dependencies need to be imported here for pyinstaller
>
--
mithrandi, i Ainil en-Balandor, a faer Ambar
Information forwarded
to debian-bugs-dist@lists.debian.org, Tristan Seligmann <mithrandi@debian.org>: Bug#921688; Package electrum.
(Sun, 02 Jun 2019 17:03:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Antoine Amarilli <a3nm@a3nm.net>:
Extra info received and forwarded to list. Copy sent to Tristan Seligmann <mithrandi@debian.org>.
(Sun, 02 Jun 2019 17:03:03 GMT) (full text, mbox, link).
Hi,
Are there any updates on packaging a new version of electrum in Debian?
Many thanks for your work on this!
Best,
--
Antoine Amarilli
Information forwarded
to debian-bugs-dist@lists.debian.org, Tristan Seligmann <mithrandi@debian.org>: Bug#921688; Package electrum.
(Sat, 20 Jul 2019 09:57:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Antoine Amarilli <a3nm@a3nm.net>:
Extra info received and forwarded to list. Copy sent to Tristan Seligmann <mithrandi@debian.org>.
(Sat, 20 Jul 2019 09:57:03 GMT) (full text, mbox, link).
Hello everyone,
This bug has been open and the electrum package has been unusable for
almost 6 months now. Tristan, are you planning on packaging a new
version at some point, or is the package no longer maintained?
Thanks for your work on this!
Best regards,
--
Antoine Amarilli
On Sun, Jun 02, 2019 at 06:55:48PM +0200, Antoine Amarilli wrote:
> Hi,
>
> Are there any updates on packaging a new version of electrum in Debian?
>
> Many thanks for your work on this!
>
> Best,
>
> --
> Antoine Amarilli
>
Added blocking bug(s) of 921688: 934910 and 934908
Request was from Laurent Bigonville <bigon@debian.org>
to control@bugs.debian.org.
(Fri, 16 Aug 2019 13:24:03 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Tristan Seligmann <mithrandi@debian.org>: Bug#921688; Package electrum.
(Sat, 07 Sep 2019 09:03:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Laurent Bigonville <bigon@debian.org>:
Extra info received and forwarded to list. Copy sent to Tristan Seligmann <mithrandi@debian.org>.
(Sat, 07 Sep 2019 09:03:03 GMT) (full text, mbox, link).
On Sat, 20 Jul 2019 11:46:37 +0200 Antoine Amarilli <a3nm@a3nm.net> wrote:
> Hello everyone,
Hello,
>
> This bug has been open and the electrum package has been unusable for
> almost 6 months now. Tristan, are you planning on packaging a new
> version at some point, or is the package no longer maintained?
I've just uploaded a NMU with the last version of electrum (3.3.8) to
unstable
My git branch can be found here: https://salsa.debian.org/bigon/electrum
if anybody wants to merge it in the official git repository of the package
FTR, I'm not planning to take care of this package in the long run.
Kind regards,
Laurent Bigonville
Reply sent
to Laurent Bigonville <bigon@debian.org>:
You have taken responsibility.
(Sat, 07 Sep 2019 12:39:14 GMT) (full text, mbox, link).
Notification sent
to darknetwhiteknight <darknetwhiteknight@riseup.net>:
Bug acknowledged by developer.
(Sat, 07 Sep 2019 12:39:14 GMT) (full text, mbox, link).
Source: electrum
Source-Version: 3.3.8-0.1
We believe that the bug you reported is fixed in the latest version of
electrum, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 921688@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Laurent Bigonville <bigon@debian.org> (supplier of updated electrum package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Sat, 07 Sep 2019 10:34:31 +0200
Source: electrum
Architecture: source
Version: 3.3.8-0.1
Distribution: unstable
Urgency: medium
Maintainer: Tristan Seligmann <mithrandi@debian.org>
Changed-By: Laurent Bigonville <bigon@debian.org>
Closes: 912042913760921688
Changes:
electrum (3.3.8-0.1) unstable; urgency=medium
.
* Non-maintainer upload.
* New upstream release.
- Fix critical vulnerability allowing certain malicious servers to display
fishing messages to the user (Closes: #921688)
- debian/control: Update the build-dependencies
* debian/rules: Stop calling pyrcc5, this is not needed anymore
* Do not move files in debian/rules but use debian/*.install files
* debian/control: Add proper Breaks/Replaces for electrum.png being moved
between packages (Closes: #912042)
* debian/control: revealer plugin seems to explicitly use "DejaVu Sans Mono"
font, recommend fonts-dejavu-core accordingly. Do not delete
SourceSansPro-Bold.otf font anymore as it's also explicitly used, but not
part of any public font package
* debian/control: Bump Standards-Version to 4.4.0 (no further changes)
* debian/control: Add libsecp256k1-0 to the Recommends, it is used to speed
up elliptic curve operations (Closes: #913760)
Checksums-Sha1:
30ab85cf823ec41c691a2af9f1b487095ac40081 2125 electrum_3.3.8-0.1.dsc
c95621c6b39618ed7c1edcc462c4bae2731903f2 8973635 electrum_3.3.8.orig.tar.gz
64559f7ac5c56d0dd21461d6a35b80aa24601778 833 electrum_3.3.8.orig.tar.gz.asc
11c52a2d6442994a8e9e8094d9272da53d0c8df4 15696 electrum_3.3.8-0.1.debian.tar.xz
dda51da773226074fdd5146a16da8cbd0f2e4f06 14324 electrum_3.3.8-0.1_source.buildinfo
Checksums-Sha256:
997dd541ccaaa0ebb0824515fbc6adc84158dba05ad0ee085e0b29881b751afc 2125 electrum_3.3.8-0.1.dsc
af9206f397fb5f5e8d3f6e3a9f8b0db1389e1d147c88a6feba73c83f87ae1b0a 8973635 electrum_3.3.8.orig.tar.gz
b9499cd93b4c1d17e34da88d200ab21cf76a987a5820345c3604864ce88fbe3b 833 electrum_3.3.8.orig.tar.gz.asc
44854b78684e4ba21b8fb703e81f548a9498a074b950c0af9f0e127eb293b771 15696 electrum_3.3.8-0.1.debian.tar.xz
18828ad1ba668b43577132410645015ca541571289557e5a914d59aee2d640af 14324 electrum_3.3.8-0.1_source.buildinfo
Files:
3d4b1cf9bc0e787d6ef42950bf5d6078 2125 utils optional electrum_3.3.8-0.1.dsc
a49a76d019afa88a683932642b53aa63 8973635 utils optional electrum_3.3.8.orig.tar.gz
c4937b121ac5b72cfc0907b3812e54fc 833 utils optional electrum_3.3.8.orig.tar.gz.asc
c38df56060beb6378d2af4535e611ee8 15696 utils optional electrum_3.3.8-0.1.debian.tar.xz
371322010beb2ae15afce7bf6ea4ecb5 14324 utils optional electrum_3.3.8-0.1_source.buildinfo
-----BEGIN PGP SIGNATURE-----
iQFFBAEBCAAvFiEEmRrdqQAhuF2x31DwH8WJHrqwQ9UFAl1zbCcRHGJpZ29uQGRl
Ymlhbi5vcmcACgkQH8WJHrqwQ9WfdQf/cgJSS9PRwKZuXuJ9pC8hZcXqU/5v3ruK
RTB4kWQtEW6Rd+0lEeqtr0FcIqsfypU9xAcA0JEItznkN5IaHgaJNDYLc33YtcrG
6B/O33UPXRZ5gsgK641uWrZZnR6nvxHniPOsGfs5Zs8dTigQF96i/Xp+lRyFd7a6
LWS7K3/YtXCcOaUBOmORE2HUS0IXn5G566DOA7cH3r0fL0t+tHIsZJZT2wjStyv8
2LFtboxuGenzAbRk3pfHpTuaEixCKkIGCrFWAFDIWAXlZiCsWEtxeYcVgWo0g7kt
LgY864KPs8j1SXka25okO9ab1DVVSly7m0O80naU2mRv0esOpqzaAg==
=DfM9
-----END PGP SIGNATURE-----
Reply sent
to Laurent Bigonville <bigon@debian.org>:
You have taken responsibility.
(Sat, 07 Sep 2019 12:39:15 GMT) (full text, mbox, link).
Notification sent
to Michael S <manager0182@yandex.com>:
Bug acknowledged by developer.
(Sat, 07 Sep 2019 12:39:15 GMT) (full text, mbox, link).
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Thu, 10 Oct 2019 07:43:08 GMT) (full text, mbox, link).
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.