Your message dated Sat, 11 Feb 2012 12:09:44 +0100
with message-id 
<caekl+rgv5nmtq743wxuamjv9xn+2ao4jgeampbcfy5j8vnc...@mail.gmail.com>
and subject line Fixed in v 1.5.2-5
has caused the Debian Bug report #534973,
regarding compface: bufer overflow in xbm-file
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
534973: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534973
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Subject: compface: bufer overflow in xbm-file
Package: compface
Version: 1:1.5.2-4
Severity: grave
Justification: user security hole
Tags: security

*** Please type your report below this line ***

please note that serius bufer overflow vuln in compface:

  http://milw0rm.org/exploits/8982

-- System Information:
Debian Release: 5.0.2
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-2-686 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages compface depends on:
ii  libc6                         2.7-18     GNU C Library: Shared 
libraries
pi  libcompfaceg1                 1:1.5.2-4  Compress/decompress 
images for mai

compface recommends no packages.

compface suggests no packages.

-- no debconf information

--
Improve your driving ability with a stop at traffic school. Click now!
 
http://tagline.hushmail.com/fc/BLSrjkqhynuzyryeUmYRzlGlYnNeBH1StpEla6mapWGfI2Km3snlzpriJVG/




--- End Message ---
--- Begin Message ---
-- 
Håkan Ardö


--- End Message ---

Reply via email to