Bug#298173: sylpheed: [security] buffer overflow (= 1.0.2), now 1.0.3 is released

2005-03-22 Thread Hideki Yamane
Hi Ricardo,

  Sun, 6 Mar 2005 13:35:15 +0100, Ricardo Mones
  Re: Bug#298173: sylpheed: [security] buffer overflow (= 1.0.2), now 1.0.3 
is released
  There was no security bug at the time I made the packages (see their
dates), that's the reason there are no references to this bug there.

 Ah, OK. But if you would note about security fix in changelog 
 when you notice it, we can track it more easier, I think.


  * Is fixed version in woody available?

  No, still not, sorry. That will take some time I currently lack, so
patches are fully welcome :)

 I've contacted to upstream author Hiroyuki Yamamoto, he checked it
 carefully and it found that vulnerability exists after 0.8.0, so 
 there is no security bug in woody's version.

 Thanks a lot, Hiroyuki! :)





-- 
Regards,

 Hideki Yamane henrich @ samba.gr.jp/iijmio-mail.jp
 Key fingerprint = 4555 82ED 38B6 C870 E099  388C 22ED 21CB C4C7 264B



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#298173: sylpheed: [security] buffer overflow (= 1.0.2), now 1.0.3 is released

2005-03-06 Thread Ricardo Mones
On Sun, 06 Mar 2005 11:09:30 +0900
Hideki Yamane [EMAIL PROTECTED] wrote:

   Sat, 05 Mar 2005 17:35:02 +0100, Ricardo Mones
   Re: Bug#298173: sylpheed: [security] buffer overflow (= 1.0.2), now
 1.0.3 is released
   Thanks for reminding but I've already done it, just waiting for my
 sponsor to upload the packages. 
   See http://sylpheed.mine.nu:9981/debian if you need updated packages.
 
  OK, Thanks.
 
  * urgency should be high to get it into testing as soon as possible.
If it is low, it would be 10 days later. high is 2 days later.
  * please describe this is security fix version in changelog.Debian.

  There was no security bug at the time I made the packages (see their
dates), that's the reason there are no references to this bug there.

  * Is fixed version in woody available?

  No, still not, sorry. That will take some time I currently lack, so
patches are fully welcome :)

  regards,
-- 
  Ricardo Mones Lastra - [EMAIL PROTECTED]
  Centro de Inteligencia Artificial, Universidad de Oviedo en Gijon
  33271 Asturias, SPAIN. - http://www.aic.uniovi.es/mones


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#298173: sylpheed: [security] buffer overflow (= 1.0.2), now 1.0.3 is released

2005-03-05 Thread Hideki Yamane
Package: sylpheed
Severity: critical

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Dear sylpeed maintainer,

 A buffer overflow bug was found and fixed at 1.0.3. 
 This problem exists in almost all of the older version, so it affects
 woody, sarge and sid. Please update sylpheed package.

 See http://sylpheed.good-day.net/index.cgi.en and check its detail.


- --
Regards,

 Hideki Yamane henrich @ samba.gr.jp/iijmio-mail.jp


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFCKZbUIu0hy8THJksRAlqQAJ40zoYIwFu454/mVdiw25RKTHDG5wCcDXK5
VGs/7WPl3JXpB1Quzx8e4YI=
=yHMo
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#298173: sylpheed: [security] buffer overflow (= 1.0.2), now 1.0.3 is released

2005-03-05 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 298173 pending
Bug#298173: sylpheed: [security] buffer overflow (= 1.0.2), now 1.0.3 is 
released
Tags were: woody sid sarge security
Tags added: pending

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#298173: sylpheed: [security] buffer overflow (= 1.0.2), now 1.0.3 is released

2005-03-05 Thread Ricardo Mones
tags 298173 pending
thanks

Dear sylpheed user,

On Sat, 05 Mar 2005 20:24:04 +0900
Hideki Yamane [EMAIL PROTECTED] wrote:

 Package: sylpheed
 Severity: critical
 
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 
 Dear sylpeed maintainer,
 
  A buffer overflow bug was found and fixed at 1.0.3. 
  This problem exists in almost all of the older version, so it affects
  woody, sarge and sid. Please update sylpheed package.
 
  See http://sylpheed.good-day.net/index.cgi.en and check its detail.

  Thanks for reminding but I've already done it, just waiting for my
sponsor to upload the packages. 
  See http://sylpheed.mine.nu:9981/debian if you need updated packages.
-- 
  Ricardo Mones Lastra - [EMAIL PROTECTED]
  Centro de Inteligencia Artificial, Universidad de Oviedo en Gijon
  33271 Asturias, SPAIN. - http://www.aic.uniovi.es/mones


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#298173: sylpheed: [security] buffer overflow (= 1.0.2), now 1.0.3 is released

2005-03-05 Thread Hideki Yamane
Hi,

  Sat, 05 Mar 2005 17:35:02 +0100, Ricardo Mones
  Re: Bug#298173: sylpheed: [security] buffer overflow (= 1.0.2), now 1.0.3 
is released
  Thanks for reminding but I've already done it, just waiting for my
sponsor to upload the packages. 
  See http://sylpheed.mine.nu:9981/debian if you need updated packages.

 OK, Thanks.

 * urgency should be high to get it into testing as soon as possible.
   If it is low, it would be 10 days later. high is 2 days later.
 * please describe this is security fix version in changelog.Debian.
 * Is fixed version in woody available?
   



-- 
Regards,

 Hideki Yamane henrich @ samba.gr.jp/iijmio-mail.jp
 Key fingerprint = 4555 82ED 38B6 C870 E099  388C 22ED 21CB C4C7 264B



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]