Your message dated Thu, 23 Sep 2004 22:12:17 -0500 with message-id <[EMAIL PROTECTED]> and subject line closing bugs has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 25 Aug 2004 14:57:21 +0000 >From [EMAIL PROTECTED] Wed Aug 25 07:57:21 2004 Return-path: <[EMAIL PROTECTED]> Received: from luonnotar.infodrom.org [195.124.48.78] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1BzzDF-0002Ab-00; Wed, 25 Aug 2004 07:57:21 -0700 Received: by luonnotar.infodrom.org (Postfix, from userid 10) id C89FD366B81; Wed, 25 Aug 2004 16:57:18 +0200 (CEST) Received: at Infodrom Oldenburg (/\##/\ Smail-3.2.0.102 1998-Aug-2 #2) from infodrom.org by finlandia.Infodrom.North.DE via smail from stdin id <[EMAIL PROTECTED]> for [EMAIL PROTECTED]; Wed, 25 Aug 2004 16:54:03 +0200 (CEST) Date: Wed, 25 Aug 2004 16:54:03 +0200 From: Martin Schulze <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: [CAN-2004-0746] Konqueror Cross-Domain Cookie Injection Message-ID: <[EMAIL PROTECTED]> Mime-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline User-Agent: Mutt/1.5.6+20040803i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-5.5 required=4.0 tests=BAYES_30,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: Package: konqueror Version: 3.2.3-1 Severity: grave Tags: security upstream sarge Web sites operating under the affected domains can set HTTP cookies in such a way that the Konqueror web browser will send them to all other web sites operating under the same domain. A malicious website can use this as part of a session fixation attack. See e.g. http://www.acros.si/papers/session_fixation.pdf Affected are all country specific secondary top level domains that use more than 2 characters in the secondary part of the domain name and that use a secondary part other than com, net, mil, org, gov, edu or int. Examples of affected domains are .ltd.uk, .plc.uk and .firm.in KDE versions up to KDE 3.2.3 inclusive. KDE 3.3 is not affected. There is 3.2.3-1 in sid for some architectures, but they will probably replaced soon by 3.3.0-1 which is said to be not vulnerable. Regards, Joey -- There are lies, statistics and benchmarks. Please always Cc to me when replying to me on the lists. --------------------------------------- Received: (at 268016-done) by bugs.debian.org; 24 Sep 2004 03:12:29 +0000 >From [EMAIL PROTECTED] Thu Sep 23 20:12:21 2004 Return-path: <[EMAIL PROTECTED]> Received: from spameater02-04.dimenocmail.com [66.195.127.26] by spohr.debian.org with smtp (Exim 3.35 1 (Debian)) id 1CAgVR-00026F-00; Thu, 23 Sep 2004 20:12:21 -0700 Received: (qmail 63689 invoked by uid 1011); 24 Sep 2004 07:14:22 -0000 Received: from [EMAIL PROTECTED] by spameater02-04.dimenocmail.com by uid 1008 with qmail-scanner-1.22-st-qms (spamassassin: 2.64. Clear:RC:1(66.194.152.191):SA:0(-4.9/3.0):. Processed in 0.162676 secs); 24 Sep 2004 07:14:22 -0000 X-Antivirus-MYDOMAIN-Mail-From: [EMAIL PROTECTED] via spameater02-04.dimenocmail.com X-Antivirus-MYDOMAIN: 1.22-st-qms (Clear:RC:1(66.194.152.191):SA:0(-4.9/3.0):. Processed in 0.162676 secs Process 63682) Received: from pico.surpasshosting.com (66.194.152.191) by spameater02-04.dimenocmail.com with SMTP; 24 Sep 2004 07:14:22 -0000 Received: from cdm-208-180-235-136.cnro.cox-internet.com ([208.180.235.136] helo=localhost.localdomain) by pico.surpasshosting.com with esmtp (TLSv1:RC4-SHA:128) (Exim 4.34) id 1CAgVP-00046t-FU; Thu, 23 Sep 2004 23:12:19 -0400 Received: from ccheney by localhost.localdomain with local (Exim 4.34) id 1CAgVN-0007mA-8H; Thu, 23 Sep 2004 22:12:17 -0500 Date: Thu, 23 Sep 2004 22:12:17 -0500 From: Chris Cheney <[EMAIL PROTECTED]> To: [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: closing bugs Message-ID: <[EMAIL PROTECTED]> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="Hch1Uz/zGPcHFdv8" Content-Disposition: inline User-Agent: Mutt/1.5.6+20040818i Sender: Christopher L Cheney <[EMAIL PROTECTED]> Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-2.0 required=4.0 tests=BAYES_01 autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: X-CrossAssassin-Score: 2 --Hch1Uz/zGPcHFdv8 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline My new upload has included the fixes from the NMU so I am officially closing the bugs now. Thanks, Chris Cheney --Hch1Uz/zGPcHFdv8 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.5 (GNU/Linux) iD8DBQFBU5CR0QZas444SvIRAsDvAJ4ieHNeYdNWCGAx0l+WyPtkvn7qggCdEBsv 2xqUJpi/eCZNsk67ulqMAOM= =+kW+ -----END PGP SIGNATURE----- --Hch1Uz/zGPcHFdv8--