Your message dated Tue, 08 Dec 2009 21:49:43 +0000
with message-id <[email protected]>
and subject line Bug#560080: fixed in devil 1.7.8-6
has caused the Debian Bug report #560080,
regarding CVE-2009-3994: Buffer overflow in DICOM code
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
560080: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560080
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: devil
Severity: grave
Tags: security
Please see
http://sourceforge.net/tracker/?func=detail&aid=2908728&group_id=4470&atid=304470
Cheers,
Moritz
-- System Information:
Debian Release: squeeze/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.31-1-686 (SMP w/1 CPU core)
Locale: LANG=C, lc_ctype=de_de.iso-8859...@euro (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash
--- End Message ---
--- Begin Message ---
Source: devil
Source-Version: 1.7.8-6
We believe that the bug you reported is fixed in the latest version of
devil, which is due to be installed in the Debian FTP archive:
devil_1.7.8-6.diff.gz
to main/d/devil/devil_1.7.8-6.diff.gz
devil_1.7.8-6.dsc
to main/d/devil/devil_1.7.8-6.dsc
libdevil-dev_1.7.8-6_amd64.deb
to main/d/devil/libdevil-dev_1.7.8-6_amd64.deb
libdevil1c2_1.7.8-6_amd64.deb
to main/d/devil/libdevil1c2_1.7.8-6_amd64.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Bradley Smith <[email protected]> (supplier of updated devil package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Tue, 08 Dec 2009 20:09:02 +0000
Source: devil
Binary: libdevil1c2 libdevil-dev
Architecture: source amd64
Version: 1.7.8-6
Distribution: unstable
Urgency: high
Maintainer: Bradley Smith <[email protected]>
Changed-By: Bradley Smith <[email protected]>
Description:
libdevil-dev - Cross-platform image loading and manipulation toolkit
libdevil1c2 - Cross-platform image loading and manipulation toolkit
Closes: 560080
Changes:
devil (1.7.8-6) unstable; urgency=high
.
* Fix CVE-2009-3994. Closes: #560080.
Checksums-Sha1:
3e7c88cbfe8bedc6d3f736cdaaefc8e961dd976d 1286 devil_1.7.8-6.dsc
2b85f767ed3b0150524fe59c65d3f2a7a89af184 6219 devil_1.7.8-6.diff.gz
c391ec1ae82ea335e9efa6f1cc30be1525f46b9e 659726 libdevil1c2_1.7.8-6_amd64.deb
566de515c80d8a19510b572980cf8515ee89bf3f 340658 libdevil-dev_1.7.8-6_amd64.deb
Checksums-Sha256:
c4703988d04aecd543266e11302a597ccd3c634481a0f205242a8d74c3d87104 1286
devil_1.7.8-6.dsc
2ac658764c54480c01bcb636db970e276dd6d86a3ab748132685a9fbdc11d584 6219
devil_1.7.8-6.diff.gz
cf203ae2c1a96875cea4cb284be3627defdc5ce0466eacdd87fc5635883dbe99 659726
libdevil1c2_1.7.8-6_amd64.deb
1930e99e1be962920c73ed0c60a1fd82c1ea356476882e413fa0b1fd2ae38ab2 340658
libdevil-dev_1.7.8-6_amd64.deb
Files:
183571a67c537d2d4dad31bf862440a1 1286 devel optional devil_1.7.8-6.dsc
befc8ac4d04e76df5271344ef196581a 6219 devel optional devil_1.7.8-6.diff.gz
bb6e333fd73d91e0da3bc8b5ff98619c 659726 libs optional
libdevil1c2_1.7.8-6_amd64.deb
aba05bdd36ec7f966ffd06ee2806d04d 340658 libdevel optional
libdevil-dev_1.7.8-6_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAkses3EACgkQj3BimscY00eEYwCgi6oIrMcdyI0ET74DZDd/JoBv
8gMAnjQF9uPxvTrxUa4Bk3/NwtruYsII
=mv0+
-----END PGP SIGNATURE-----
--- End Message ---