Your message dated Tue, 08 Dec 2009 21:49:43 +0000
with message-id <[email protected]>
and subject line Bug#560080: fixed in devil 1.7.8-6
has caused the Debian Bug report #560080,
regarding CVE-2009-3994: Buffer overflow in DICOM code
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
560080: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560080
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: devil
Severity: grave
Tags: security

Please see
http://sourceforge.net/tracker/?func=detail&aid=2908728&group_id=4470&atid=304470
 

Cheers,
        Moritz

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.31-1-686 (SMP w/1 CPU core)
Locale: LANG=C, lc_ctype=de_de.iso-8859...@euro (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash



--- End Message ---
--- Begin Message ---
Source: devil
Source-Version: 1.7.8-6

We believe that the bug you reported is fixed in the latest version of
devil, which is due to be installed in the Debian FTP archive:

devil_1.7.8-6.diff.gz
  to main/d/devil/devil_1.7.8-6.diff.gz
devil_1.7.8-6.dsc
  to main/d/devil/devil_1.7.8-6.dsc
libdevil-dev_1.7.8-6_amd64.deb
  to main/d/devil/libdevil-dev_1.7.8-6_amd64.deb
libdevil1c2_1.7.8-6_amd64.deb
  to main/d/devil/libdevil1c2_1.7.8-6_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bradley Smith <[email protected]> (supplier of updated devil package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Tue, 08 Dec 2009 20:09:02 +0000
Source: devil
Binary: libdevil1c2 libdevil-dev
Architecture: source amd64
Version: 1.7.8-6
Distribution: unstable
Urgency: high
Maintainer: Bradley Smith <[email protected]>
Changed-By: Bradley Smith <[email protected]>
Description: 
 libdevil-dev - Cross-platform image loading and manipulation toolkit
 libdevil1c2 - Cross-platform image loading and manipulation toolkit
Closes: 560080
Changes: 
 devil (1.7.8-6) unstable; urgency=high
 .
   * Fix CVE-2009-3994. Closes: #560080.
Checksums-Sha1: 
 3e7c88cbfe8bedc6d3f736cdaaefc8e961dd976d 1286 devil_1.7.8-6.dsc
 2b85f767ed3b0150524fe59c65d3f2a7a89af184 6219 devil_1.7.8-6.diff.gz
 c391ec1ae82ea335e9efa6f1cc30be1525f46b9e 659726 libdevil1c2_1.7.8-6_amd64.deb
 566de515c80d8a19510b572980cf8515ee89bf3f 340658 libdevil-dev_1.7.8-6_amd64.deb
Checksums-Sha256: 
 c4703988d04aecd543266e11302a597ccd3c634481a0f205242a8d74c3d87104 1286 
devil_1.7.8-6.dsc
 2ac658764c54480c01bcb636db970e276dd6d86a3ab748132685a9fbdc11d584 6219 
devil_1.7.8-6.diff.gz
 cf203ae2c1a96875cea4cb284be3627defdc5ce0466eacdd87fc5635883dbe99 659726 
libdevil1c2_1.7.8-6_amd64.deb
 1930e99e1be962920c73ed0c60a1fd82c1ea356476882e413fa0b1fd2ae38ab2 340658 
libdevil-dev_1.7.8-6_amd64.deb
Files: 
 183571a67c537d2d4dad31bf862440a1 1286 devel optional devil_1.7.8-6.dsc
 befc8ac4d04e76df5271344ef196581a 6219 devel optional devil_1.7.8-6.diff.gz
 bb6e333fd73d91e0da3bc8b5ff98619c 659726 libs optional 
libdevil1c2_1.7.8-6_amd64.deb
 aba05bdd36ec7f966ffd06ee2806d04d 340658 libdevel optional 
libdevil-dev_1.7.8-6_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkses3EACgkQj3BimscY00eEYwCgi6oIrMcdyI0ET74DZDd/JoBv
8gMAnjQF9uPxvTrxUa4Bk3/NwtruYsII
=mv0+
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to