Your message dated Mon, 24 Jan 2005 11:48:08 -0300 with message-id <[EMAIL PROTECTED]> and subject line has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 24 Jan 2005 14:16:50 +0000 >From [EMAIL PROTECTED] Mon Jan 24 06:16:50 2005 Return-path: <[EMAIL PROTECTED]> Received: from mail.arcert.gov.ar [200.47.53.18] by spohr.debian.org with smtp (Exim 3.35 1 (Debian)) id 1Ct51N-0004zT-00; Mon, 24 Jan 2005 06:16:49 -0800 Received: (qmail 8446 invoked from network); 24 Jan 2005 14:16:44 -0000 X-Scanned-By: ArCERT. Received: from unknown (HELO clementina.arcert.gov.ar) (arcert) by mail.arcert.gov.ar with SMTP; 24 Jan 2005 14:16:44 -0000 Subject: "Decrypt::makeFileKey2()" Buffer Overflow From: Luciano Bello <[EMAIL PROTECTED]> To: Submit BTS <[EMAIL PROTECTED]> Cc: [EMAIL PROTECTED] Content-Type: text/plain Date: Mon, 24 Jan 2005 11:14:57 -0300 Message-Id: <[EMAIL PROTECTED]> Mime-Version: 1.0 X-Mailer: Evolution 2.0.3 Content-Transfer-Encoding: 7bit Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-7.0 required=4.0 tests=BAYES_01,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: kpdf Version: 3.x Severity: grave Tags: security patch TITLE: KOffice "Decrypt::makeFileKey2()" Buffer Overflow SECUNIA ADVISORY ID: SA13934 VERIFY ADVISORY: http://secunia.com/advisories/13934/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote SOFTWARE: KOffice 1.x http://secunia.com/product/4155/ DESCRIPTION: A vulnerability has been reported in KOffice, which can be exploited by malicious people to compromise a user's system. For more information: SA13903 The vulnerability has been reported in versions 1.3 through 1.3.5. SOLUTION: Apply patch. KOffice 1.3.5: ftp://ftp.kde.org/pub/kde/security_patches/post-1.3.5-koffice.diff ORIGINAL ADVISORY: http://www.kde.org/info/security/advisory-20050120-1.txt OTHER REFERENCES: SA13903: http://secunia.com/advisories/13903/ --------------------------------------- Received: (at 292002-done) by bugs.debian.org; 24 Jan 2005 14:50:03 +0000 >From [EMAIL PROTECTED] Mon Jan 24 06:50:02 2005 Return-path: <[EMAIL PROTECTED]> Received: from mail.arcert.gov.ar [200.47.53.18] by spohr.debian.org with smtp (Exim 3.35 1 (Debian)) id 1Ct5XW-00038h-00; Mon, 24 Jan 2005 06:50:02 -0800 Received: (qmail 9615 invoked from network); 24 Jan 2005 14:49:54 -0000 X-Scanned-By: ArCERT. Received: from unknown (HELO clementina.arcert.gov.ar) (arcert) by mail.arcert.gov.ar with SMTP; 24 Jan 2005 14:49:53 -0000 Subject: From: Luciano Bello <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Content-Type: text/plain Date: Mon, 24 Jan 2005 11:48:08 -0300 Message-Id: <[EMAIL PROTECTED]> Mime-Version: 1.0 X-Mailer: Evolution 2.0.3 Content-Transfer-Encoding: 7bit Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-1.5 required=4.0 tests=BAYES_00,NOSUBJECT autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: It's done acording to http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=291245 Sorry -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]