Your message dated Sun, 22 May 2005 18:15:58 +0200
with message-id <[EMAIL PROTECTED]>
and subject line Bug fixed in 0.6.1-3 upload
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 19 May 2005 10:35:30 +0000
>From [EMAIL PROTECTED] Thu May 19 03:35:30 2005
Return-path: <[EMAIL PROTECTED]>
Received: from 81-202-91-238.user.ono.com (nubol.int.oskuro.net) 
[81.202.91.238] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DYiNG-0002gu-00; Thu, 19 May 2005 03:35:30 -0700
Received: by nubol.int.oskuro.net (Postfix, from userid 1000)
        id 3B5C270A746; Thu, 19 May 2005 12:34:59 +0200 (CEST)
Date: Thu, 19 May 2005 12:34:59 +0200
From: Jordi Mallach <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Cc: [EMAIL PROTECTED]
Subject: [SECURITY] multiple vulnerabilities
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
        protocol="application/pgp-signature"; boundary="mYCpIKhGyMATD0i+"
Content-Disposition: inline
X-Reportbug-Version: 3.12
User-Agent: Mutt/1.5.9i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 


--mYCpIKhGyMATD0i+
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Package: mailutils
Version: 1:0.6.1-2
Severity: grave
Tags: security, sarge, sid, pending, patch

The new mailutils upstream version fixes 4 vulnerabilities found by
iDEFENSE (IDEF0954, IDEF0955, IDEF0956, IDEF0957).

I have backported a patch to 0.6.1, but have encountered a FTBFS in the
testsuite run. I'm trying to find out with upstream what causes this,
but expect an upload soon.

Attached is the current patch, including the testsuite additions that
are failing.

I have not checked if stable is affected yet. I will try to work on that
this evening.


-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (990, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.10-1-k7
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=3DUTF=
-8)

Versions of packages mailutils depends on:
ii  guile-1.6-libs      1.6.7-1              Main Guile libraries
ii  libc6               2.3.2.ds1-22         GNU C Library: Shared librarie=
s an
ii  libcomerr2          1.37+1.38-WIP-0509-1 common error description libra=
ry
ii  libgcrypt11         1.2.0-11             LGPL Crypto library - runtime =
libr
ii  libgdbm3            1.8.3-2              GNU dbm database routines (run=
time
ii  libgnutls11         1.0.16-13            GNU TLS library - runtime libr=
ary
ii  libgpg-error0       1.0-1                library for common error value=
s an
ii  libgsasl7           0.2.5-1              GNU SASL library
ii  libguile-ltdl-1     1.6.7-1              Guile's patched version of lib=
tool
ii  libidn11            0.5.13-1.0           GNU libidn library, implementa=
tion
ii  libkrb53            1.3.6-3              MIT Kerberos runtime libraries
ii  libmailutils0       1:0.6.1-2            GNU Mail abstraction library
ii  libmysqlclient12    4.0.24-9             mysql database client library
ii  libncurses5         5.4-4                Shared libraries for terminal =
hand
ii  libpam0g            0.76-22              Pluggable Authentication Modul=
es l
ii  libqthreads-12      1.6.7-1              QuickThreads library for Guile
ii  libreadline5        5.0-10               GNU readline and history libra=
ries
ii  libtasn1-2          0.2.10-4             Manage ASN.1 structures (runti=
me)
ii  zlib1g              1:1.2.2-4            compression library - runtime

-- no debconf information

--=20
Jordi Mallach P=E9rez  --  Debian developer     http://www.debian.org/
[EMAIL PROTECTED]     [EMAIL PROTECTED]     http://www.sindominio.net/
GnuPG public key information available at http://oskuro.net/

--mYCpIKhGyMATD0i+
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFCjGvSJYSUupF6Il4RAl2yAKDMxUvRCjalEw5svoZ6zHr74IKWDACgmY6Z
YGdYPhoPA28+iOZl7rWRVmY=
=vGCY
-----END PGP SIGNATURE-----

--mYCpIKhGyMATD0i+--

---------------------------------------
Received: (at 309751-done) by bugs.debian.org; 22 May 2005 16:16:45 +0000
>From [EMAIL PROTECTED] Sun May 22 09:16:45 2005
Return-path: <[EMAIL PROTECTED]>
Received: from 81-202-91-238.user.ono.com (nubol.int.oskuro.net) 
[81.202.91.238] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DZt89-0005fV-00; Sun, 22 May 2005 09:16:45 -0700
Received: by nubol.int.oskuro.net (Postfix, from userid 1000)
        id EAFCB70A746; Sun, 22 May 2005 18:15:58 +0200 (CEST)
Date: Sun, 22 May 2005 18:15:58 +0200
From: Jordi Mallach <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Bug fixed in 0.6.1-3 upload
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
User-Agent: Mutt/1.5.9i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no 
        version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

This bug was fixed in today's upload of mailutils. Changelog is as
follows:

mailutils (1:0.6.1-3) unstable; urgency=3DHIGH

  * "Hey, I did finish that triathlon" release.
  * [SECURITY] debian/patches/04_IDEF0954_IDEF0955_IDEF0956_IDEF0957.patch:
    backport fixes to vulnerabilities discovered by iDEFENSE with
    IDs IDEF0954, IDEF0955, IDEF0956 and IDEF0957 (closes: #309751).
    Thanks to Sergey Poznyakoff.
  * debian/changelog: insert missing changelog entry for 20011103-1.1.

 -- Jordi Mallach <[EMAIL PROTECTED]>  Sun, 22 May 2005 17:13:58 +0200

--=20
Jordi Mallach P=E9rez  --  Debian developer     http://www.debian.org/
[EMAIL PROTECTED]     [EMAIL PROTECTED]     http://www.sindominio.net/
GnuPG public key information available at http://oskuro.net/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to