Your message dated Tue, 19 Aug 2008 12:02:06 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#483562: fixed in pan 0.133-1
has caused the Debian Bug report #483562,
regarding CVE-2008-2363 Assertion fails when starting PAN
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
483562: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=483562
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: pan
Version: .132
Severity: grave

Redhat has a bug for a possible buffer overflow that could result in remote
code execution:
https://bugzilla.redhat.com/show_bug.cgi?id=446902

The proposed patch is at:
https://bugzilla.redhat.com/attachment.cgi?id=306880




--- End Message ---
--- Begin Message ---
Source: pan
Source-Version: 0.133-1

We believe that the bug you reported is fixed in the latest version of
pan, which is due to be installed in the Debian FTP archive:

pan_0.133-1.diff.gz
  to pool/main/p/pan/pan_0.133-1.diff.gz
pan_0.133-1.dsc
  to pool/main/p/pan/pan_0.133-1.dsc
pan_0.133-1_amd64.deb
  to pool/main/p/pan/pan_0.133-1_amd64.deb
pan_0.133.orig.tar.gz
  to pool/main/p/pan/pan_0.133.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Norbert Tretkowski <[EMAIL PROTECTED]> (supplier of updated pan package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Tue, 19 Aug 2008 13:20:54 +0200
Source: pan
Binary: pan
Architecture: source amd64
Version: 0.133-1
Distribution: experimental
Urgency: low
Maintainer: Mario Iseli <[EMAIL PROTECTED]>
Changed-By: Norbert Tretkowski <[EMAIL PROTECTED]>
Description: 
 pan        - A Newsreader based on GTK2, which looks like Forte Agent
Closes: 483562
Changes: 
 pan (0.133-1) experimental; urgency=low
 .
   * New upstream release.
   * Remove patches:
     + debian/patches/CVE-2008-2363.dpatch (closes: #483562)
     + debian/patches/03_ftbfs-gcc-4.3.dpatch
     + debian/patches/04_g_assert.dpatch
Checksums-Sha1: 
 d17222bf90c57231202385f6ee1dd72ab4bbfb1d 1139 pan_0.133-1.dsc
 7e4f4ae75e604bbf64c300a0ff1fbfa758c56768 2039533 pan_0.133.orig.tar.gz
 aeca9122472de36f19cab45f714585cb0b126f4b 13483 pan_0.133-1.diff.gz
 b31c9dfac226aab5945bc4c4a9ca638279924d47 1090852 pan_0.133-1_amd64.deb
Checksums-Sha256: 
 a65fe5bf3bcce8125f29431d5c2f45a7f2c9609ad1a4e5eac7e53d2ad5c00d4d 1139 
pan_0.133-1.dsc
 4b98b77ba2e9183a38aa9127c80e25585a2667036a40ece40e2e981b10b885f3 2039533 
pan_0.133.orig.tar.gz
 22010ddfe75284d93c8b6a96814bf960bdb308d7cb751b6d1333ac8c41f145cb 13483 
pan_0.133-1.diff.gz
 73bb7497a3770c0ae1f3f6953cc2c66383da81e76a1cd584fbb588b04bc283ac 1090852 
pan_0.133-1_amd64.deb
Files: 
 e9cf808aa16f63e26bc400af3cafe0a8 1139 news optional pan_0.133-1.dsc
 a3728527e6b1ee7e1a4a76fcd4959b74 2039533 news optional pan_0.133.orig.tar.gz
 123df0ba3ec6546fd5289cce23ea67fc 13483 news optional pan_0.133-1.diff.gz
 f0f43f4f16d24072151fd8b67274a31d 1090852 news optional pan_0.133-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFIqrEQr/RnCw96jQERAvb8AKCuFT8OdA1BcrO5yiLD0YKu1TzmggCfZ6h5
afwBVbABqJmkQwIWob268GE=
=EJf9
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to