Your message dated Fri, 21 Oct 2005 01:47:08 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#264684: fixed in pavuk 0.9.33-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 9 Aug 2004 22:15:32 +0000
>From [EMAIL PROTECTED] Mon Aug 09 15:15:32 2004
Return-path: <[EMAIL PROTECTED]>
Received: from kitenet.net [64.62.161.42] (postfix)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1BuIQW-00017R-00; Mon, 09 Aug 2004 15:15:32 -0700
Received: from chicken.kitenet.net (unknown [66.168.94.144])
        (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
        (Client CN "Joey Hess", Issuer "Joey Hess" (verified OK))
        by kitenet.net (Postfix) with ESMTP id 87466185DD
        for <[EMAIL PROTECTED]>; Mon,  9 Aug 2004 22:15:31 +0000 (GMT)
Received: by chicken.kitenet.net (Postfix, from userid 1000)
        id B3EFC4FC3; Mon,  9 Aug 2004 17:57:53 -0400 (EDT)
Date: Mon, 9 Aug 2004 17:57:53 -0400
From: Joey Hess <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: DSA-527-1 not fixed in unstable
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
X-Reportbug-Version: 2.63
User-Agent: Mutt/1.5.6+20040722i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: pavuk
Severity: critical
Tags: security

DSA-527-1 describes a buffer overrun hole in pavuk. Apparently this is
fixed in upstream version 0.928r2, the version in stable was also fixed.
Note that the DSA incorrectly says pavuk is not in unstable, when it
fact it just moved from non-us. Looking at the changelog, it seems that
this security hole has not yet been fixed in the version in testing and
unstable.

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.7-1-686
Locale: LANG=en_US, LC_CTYPE=en_US

-- 
see shy jo

---------------------------------------
Received: (at 264684-close) by bugs.debian.org; 21 Oct 2005 08:47:59 +0000
>From [EMAIL PROTECTED] Fri Oct 21 01:47:59 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
        id 1ESsYO-0008Tl-00; Fri, 21 Oct 2005 01:47:08 -0700
From: Petr Cech <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#264684: fixed in pavuk 0.9.33-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Fri, 21 Oct 2005 01:47:08 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: pavuk
Source-Version: 0.9.33-1

We believe that the bug you reported is fixed in the latest version of
pavuk, which is due to be installed in the Debian FTP archive:

pavuk_0.9.33-1.diff.gz
  to pool/main/p/pavuk/pavuk_0.9.33-1.diff.gz
pavuk_0.9.33-1.dsc
  to pool/main/p/pavuk/pavuk_0.9.33-1.dsc
pavuk_0.9.33-1_i386.deb
  to pool/main/p/pavuk/pavuk_0.9.33-1_i386.deb
pavuk_0.9.33.orig.tar.gz
  to pool/main/p/pavuk/pavuk_0.9.33.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Petr Cech <[EMAIL PROTECTED]> (supplier of updated pavuk package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri, 21 Oct 2005 08:25:49 +0000
Source: pavuk
Binary: pavuk
Architecture: source i386
Version: 0.9.33-1
Distribution: unstable
Urgency: medium
Maintainer: Petr Cech <[EMAIL PROTECTED]>
Changed-By: Petr Cech <[EMAIL PROTECTED]>
Description: 
 pavuk      - Multiprotocol file grabber with textual and graphic control
Closes: 248524 264684 313933
Changes: 
 pavuk (0.9.33-1) unstable; urgency=medium
 .
   * New upstream release (also closes: #264684)
   * Apply de.po patch (closes: #313933)
   * Rebuild with openssl 0.9.8
   * Rebuild with libdb4.3-dev (closes: #248524)
Files: 
 8bf799ba99f8c13b4e4cf6a9e818b48a 688 web optional pavuk_0.9.33-1.dsc
 c23f0b77329971bfb47b8988b6275375 871396 web optional pavuk_0.9.33.orig.tar.gz
 1cc74b5d22ed2f25554d8e3e86db5cd1 7487 web optional pavuk_0.9.33-1.diff.gz
 610d0b0032d7af3ce60116adb1c53cc9 673074 web optional pavuk_0.9.33-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDWKiZ0VL/2tBqhlQRAgOcAJsHCOxgAV33a1wNYSl/B187IO/VZQCfev5H
rP3gkBQ0c7G4jYt5Y5grteU=
=/FKf
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to