Bug#431831: marked as done (sun-java5-jdk: Integer overflow in ICC profile parser allows execution of arbitrary code)

2007-07-17 Thread Debian Bug Tracking System
Your message dated Tue, 17 Jul 2007 18:14:00 +0200 with message-id <[EMAIL PROTECTED]> and subject line sun-java5-jdk: Integer overflow in ICC profile parser allows execution of arbitrary code has caused the attached Bug report to be marked as done. This means that you claim that the problem has

Bug#431831:

2007-07-13 Thread Matthias Klose
Jean-Sebastien Pilon schrieb: > NOTICE: This email contains privileged and confidential information and is > intended only for the individual to whom it is addressed. If you are not the > named addressee, you should not disseminate, distribute or copy this e-mail. > Please notify the sender imme

Bug#431831:

2007-07-13 Thread Jean-Sebastien Pilon
> when do people start checking the NEW queue before filing bogus reports? How can we see the new queue and the status regarding security reports? Thanks. NOTICE: This email contains privileged and confidential information and is intended only for the individual to whom it is addressed. If you a

Bug#431831: sun-java5-jdk: Integer overflow in ICC profile parser allows execution of arbitrary code

2007-07-05 Thread Sam Morris
On Thu, 2007-07-05 at 13:05 +0200, Matthias Klose wrote: > tags 431831 + pending > thanks > > when do people start checking the NEW queue before filing bogus reports? I wasn't aware that security updates for stable generally went through NEW. Furthermore, the only entry that I see there for Sun's

Bug#431831: sun-java5-jdk: Integer overflow in ICC profile parser allows execution of arbitrary code

2007-07-05 Thread Matthias Klose
tags 431831 + pending thanks when do people start checking the NEW queue before filing bogus reports? Sam Morris schrieb: > Package: sun-java5-jdk > Version: 1.5.0-10-3 > Severity: grave > Tags: security > Justification: user security hole > > Integer overflow in the embedded ICC profile image p

Bug#431831: sun-java5-jdk: Integer overflow in ICC profile parser allows execution of arbitrary code

2007-07-05 Thread Sam Morris
Package: sun-java5-jdk Version: 1.5.0-10-3 Severity: grave Tags: security Justification: user security hole Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03, and 1.6.x before 1.6.0_01-b06, allows remote attackers to execute arbitrary c