Your message dated Sun, 22 May 2005 18:15:58 +0200
with message-id <[EMAIL PROTECTED]>
and subject line Bug fixed in 0.6.1-3 upload
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 19 May 2005 10:35:30 +0000
>From [EMAIL PROTECTED] Thu May 19 03:35:30 2005
Return-path: <[EMAIL PROTECTED]>
Received: from 81-202-91-238.user.ono.com (nubol.int.oskuro.net)
[81.202.91.238]
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1DYiNG-0002gu-00; Thu, 19 May 2005 03:35:30 -0700
Received: by nubol.int.oskuro.net (Postfix, from userid 1000)
id 3B5C270A746; Thu, 19 May 2005 12:34:59 +0200 (CEST)
Date: Thu, 19 May 2005 12:34:59 +0200
From: Jordi Mallach <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Cc: [EMAIL PROTECTED]
Subject: [SECURITY] multiple vulnerabilities
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="mYCpIKhGyMATD0i+"
Content-Disposition: inline
X-Reportbug-Version: 3.12
User-Agent: Mutt/1.5.9i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level:
--mYCpIKhGyMATD0i+
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Package: mailutils
Version: 1:0.6.1-2
Severity: grave
Tags: security, sarge, sid, pending, patch
The new mailutils upstream version fixes 4 vulnerabilities found by
iDEFENSE (IDEF0954, IDEF0955, IDEF0956, IDEF0957).
I have backported a patch to 0.6.1, but have encountered a FTBFS in the
testsuite run. I'm trying to find out with upstream what causes this,
but expect an upload soon.
Attached is the current patch, including the testsuite additions that
are failing.
I have not checked if stable is affected yet. I will try to work on that
this evening.
-- System Information:
Debian Release: 3.1
APT prefers unstable
APT policy: (990, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.10-1-k7
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=3DUTF=
-8)
Versions of packages mailutils depends on:
ii guile-1.6-libs 1.6.7-1 Main Guile libraries
ii libc6 2.3.2.ds1-22 GNU C Library: Shared librarie=
s an
ii libcomerr2 1.37+1.38-WIP-0509-1 common error description libra=
ry
ii libgcrypt11 1.2.0-11 LGPL Crypto library - runtime =
libr
ii libgdbm3 1.8.3-2 GNU dbm database routines (run=
time
ii libgnutls11 1.0.16-13 GNU TLS library - runtime libr=
ary
ii libgpg-error0 1.0-1 library for common error value=
s an
ii libgsasl7 0.2.5-1 GNU SASL library
ii libguile-ltdl-1 1.6.7-1 Guile's patched version of lib=
tool
ii libidn11 0.5.13-1.0 GNU libidn library, implementa=
tion
ii libkrb53 1.3.6-3 MIT Kerberos runtime libraries
ii libmailutils0 1:0.6.1-2 GNU Mail abstraction library
ii libmysqlclient12 4.0.24-9 mysql database client library
ii libncurses5 5.4-4 Shared libraries for terminal =
hand
ii libpam0g 0.76-22 Pluggable Authentication Modul=
es l
ii libqthreads-12 1.6.7-1 QuickThreads library for Guile
ii libreadline5 5.0-10 GNU readline and history libra=
ries
ii libtasn1-2 0.2.10-4 Manage ASN.1 structures (runti=
me)
ii zlib1g 1:1.2.2-4 compression library - runtime
-- no debconf information
--=20
Jordi Mallach P=E9rez -- Debian developer http://www.debian.org/
[EMAIL PROTECTED] [EMAIL PROTECTED] http://www.sindominio.net/
GnuPG public key information available at http://oskuro.net/
--mYCpIKhGyMATD0i+
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
iD8DBQFCjGvSJYSUupF6Il4RAl2yAKDMxUvRCjalEw5svoZ6zHr74IKWDACgmY6Z
YGdYPhoPA28+iOZl7rWRVmY=
=vGCY
-----END PGP SIGNATURE-----
--mYCpIKhGyMATD0i+--
---------------------------------------
Received: (at 309751-done) by bugs.debian.org; 22 May 2005 16:16:45 +0000
>From [EMAIL PROTECTED] Sun May 22 09:16:45 2005
Return-path: <[EMAIL PROTECTED]>
Received: from 81-202-91-238.user.ono.com (nubol.int.oskuro.net)
[81.202.91.238]
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1DZt89-0005fV-00; Sun, 22 May 2005 09:16:45 -0700
Received: by nubol.int.oskuro.net (Postfix, from userid 1000)
id EAFCB70A746; Sun, 22 May 2005 18:15:58 +0200 (CEST)
Date: Sun, 22 May 2005 18:15:58 +0200
From: Jordi Mallach <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Bug fixed in 0.6.1-3 upload
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
User-Agent: Mutt/1.5.9i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no
version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level:
This bug was fixed in today's upload of mailutils. Changelog is as
follows:
mailutils (1:0.6.1-3) unstable; urgency=3DHIGH
* "Hey, I did finish that triathlon" release.
* [SECURITY] debian/patches/04_IDEF0954_IDEF0955_IDEF0956_IDEF0957.patch:
backport fixes to vulnerabilities discovered by iDEFENSE with
IDs IDEF0954, IDEF0955, IDEF0956 and IDEF0957 (closes: #309751).
Thanks to Sergey Poznyakoff.
* debian/changelog: insert missing changelog entry for 20011103-1.1.
-- Jordi Mallach <[EMAIL PROTECTED]> Sun, 22 May 2005 17:13:58 +0200
--=20
Jordi Mallach P=E9rez -- Debian developer http://www.debian.org/
[EMAIL PROTECTED] [EMAIL PROTECTED] http://www.sindominio.net/
GnuPG public key information available at http://oskuro.net/
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]