Bug#298173: sylpheed: [security] buffer overflow (= 1.0.2), now 1.0.3 is released
Hi Ricardo, Sun, 6 Mar 2005 13:35:15 +0100, Ricardo Mones Re: Bug#298173: sylpheed: [security] buffer overflow (= 1.0.2), now 1.0.3 is released There was no security bug at the time I made the packages (see their dates), that's the reason there are no references to this bug there. Ah, OK. But if you would note about security fix in changelog when you notice it, we can track it more easier, I think. * Is fixed version in woody available? No, still not, sorry. That will take some time I currently lack, so patches are fully welcome :) I've contacted to upstream author Hiroyuki Yamamoto, he checked it carefully and it found that vulnerability exists after 0.8.0, so there is no security bug in woody's version. Thanks a lot, Hiroyuki! :) -- Regards, Hideki Yamane henrich @ samba.gr.jp/iijmio-mail.jp Key fingerprint = 4555 82ED 38B6 C870 E099 388C 22ED 21CB C4C7 264B -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#298173: sylpheed: [security] buffer overflow (= 1.0.2), now 1.0.3 is released
On Sun, 06 Mar 2005 11:09:30 +0900 Hideki Yamane [EMAIL PROTECTED] wrote: Sat, 05 Mar 2005 17:35:02 +0100, Ricardo Mones Re: Bug#298173: sylpheed: [security] buffer overflow (= 1.0.2), now 1.0.3 is released Thanks for reminding but I've already done it, just waiting for my sponsor to upload the packages. See http://sylpheed.mine.nu:9981/debian if you need updated packages. OK, Thanks. * urgency should be high to get it into testing as soon as possible. If it is low, it would be 10 days later. high is 2 days later. * please describe this is security fix version in changelog.Debian. There was no security bug at the time I made the packages (see their dates), that's the reason there are no references to this bug there. * Is fixed version in woody available? No, still not, sorry. That will take some time I currently lack, so patches are fully welcome :) regards, -- Ricardo Mones Lastra - [EMAIL PROTECTED] Centro de Inteligencia Artificial, Universidad de Oviedo en Gijon 33271 Asturias, SPAIN. - http://www.aic.uniovi.es/mones -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#298173: sylpheed: [security] buffer overflow (= 1.0.2), now 1.0.3 is released
Package: sylpheed Severity: critical -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Dear sylpeed maintainer, A buffer overflow bug was found and fixed at 1.0.3. This problem exists in almost all of the older version, so it affects woody, sarge and sid. Please update sylpheed package. See http://sylpheed.good-day.net/index.cgi.en and check its detail. - -- Regards, Hideki Yamane henrich @ samba.gr.jp/iijmio-mail.jp -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.0 (GNU/Linux) iD8DBQFCKZbUIu0hy8THJksRAlqQAJ40zoYIwFu454/mVdiw25RKTHDG5wCcDXK5 VGs/7WPl3JXpB1Quzx8e4YI= =yHMo -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#298173: sylpheed: [security] buffer overflow (= 1.0.2), now 1.0.3 is released
Processing commands for [EMAIL PROTECTED]: tags 298173 pending Bug#298173: sylpheed: [security] buffer overflow (= 1.0.2), now 1.0.3 is released Tags were: woody sid sarge security Tags added: pending thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#298173: sylpheed: [security] buffer overflow (= 1.0.2), now 1.0.3 is released
tags 298173 pending thanks Dear sylpheed user, On Sat, 05 Mar 2005 20:24:04 +0900 Hideki Yamane [EMAIL PROTECTED] wrote: Package: sylpheed Severity: critical -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Dear sylpeed maintainer, A buffer overflow bug was found and fixed at 1.0.3. This problem exists in almost all of the older version, so it affects woody, sarge and sid. Please update sylpheed package. See http://sylpheed.good-day.net/index.cgi.en and check its detail. Thanks for reminding but I've already done it, just waiting for my sponsor to upload the packages. See http://sylpheed.mine.nu:9981/debian if you need updated packages. -- Ricardo Mones Lastra - [EMAIL PROTECTED] Centro de Inteligencia Artificial, Universidad de Oviedo en Gijon 33271 Asturias, SPAIN. - http://www.aic.uniovi.es/mones -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#298173: sylpheed: [security] buffer overflow (= 1.0.2), now 1.0.3 is released
Hi, Sat, 05 Mar 2005 17:35:02 +0100, Ricardo Mones Re: Bug#298173: sylpheed: [security] buffer overflow (= 1.0.2), now 1.0.3 is released Thanks for reminding but I've already done it, just waiting for my sponsor to upload the packages. See http://sylpheed.mine.nu:9981/debian if you need updated packages. OK, Thanks. * urgency should be high to get it into testing as soon as possible. If it is low, it would be 10 days later. high is 2 days later. * please describe this is security fix version in changelog.Debian. * Is fixed version in woody available? -- Regards, Hideki Yamane henrich @ samba.gr.jp/iijmio-mail.jp Key fingerprint = 4555 82ED 38B6 C870 E099 388C 22ED 21CB C4C7 264B -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]