Your message dated Thu, 13 Jul 2006 05:02:05 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#370146: fixed in netpanzer 0.8+svn20060319-2
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: netpanzer
Severity: normal
Tags: security
Good day,
CVE-2006-2575 :
| The setFrame function in Lib/2D/Surface.hpp for NetPanzer 0.8 and
| earlier allows remote attackers to cause a
| denial of service (crash) via a client flag (frameNum) that is greater
| than 41, which triggers an assert
| error.
See also : http://aluigi.altervista.org/adv/panza-adv.txt
Please mention the CVE number in the changelog when fixing it.
Regards
--
Djoume SALVETTI
-- System Information:
Debian Release: testing/unstable
APT prefers unstable
APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: powerpc (ppc)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.15-1-powerpc
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
--- End Message ---
--- Begin Message ---
Source: netpanzer
Source-Version: 0.8+svn20060319-2
We believe that the bug you reported is fixed in the latest version of
netpanzer, which is due to be installed in the Debian FTP archive:
netpanzer_0.8+svn20060319-2.diff.gz
to pool/main/n/netpanzer/netpanzer_0.8+svn20060319-2.diff.gz
netpanzer_0.8+svn20060319-2.dsc
to pool/main/n/netpanzer/netpanzer_0.8+svn20060319-2.dsc
netpanzer_0.8+svn20060319-2_powerpc.deb
to pool/main/n/netpanzer/netpanzer_0.8+svn20060319-2_powerpc.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Gonéri Le Bouder <[EMAIL PROTECTED]> (supplier of updated netpanzer package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Sun, 4 Jun 2006 14:27:45 +0200
Source: netpanzer
Binary: netpanzer
Architecture: source powerpc
Version: 0.8+svn20060319-2
Distribution: unstable
Urgency: low
Maintainer: Debian Games Team <[EMAIL PROTECTED]>
Changed-By: Gonéri Le Bouder <[EMAIL PROTECTED]>
Description:
netpanzer - online multiplayer tactical warfare game
Closes: 370146
Changes:
netpanzer (0.8+svn20060319-2) unstable; urgency=low
.
* fix watch file
* Standards-Version: 3.7.2
* update Debian Games Team home page in copyright file
* [CVE-2006-2575] setFrame() Denial of Service Vulnerability
Closes: #370146
* switch from dpatch to simple-patchsys
Files:
5f2aac357438d51296c3df3cb2345c07 783 games optional
netpanzer_0.8+svn20060319-2.dsc
6c2e7356dfb7056aeeffc0eba002e83e 4900 games optional
netpanzer_0.8+svn20060319-2.diff.gz
78a22d0c853151427a486d332a4fa602 486930 games optional
netpanzer_0.8+svn20060319-2_powerpc.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)
iD8DBQFEtjVtBxd04ADYzRYRAnxGAJ4xyF7mAIZ0Yz6iMnLgaadd36pagACePjEk
V5/dKtkhVRFqg279dmooB9Y=
=fYZG
-----END PGP SIGNATURE-----
--- End Message ---