Your message dated Thu, 13 Apr 2006 09:40:24 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#349653: fixed in xmame 0.104-1
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: xmame
Version: 0.101-1
Severity: critial
Tags: security
Hi!
A recent post on bugtraq [1] mentions several exploitable buffer
overflows. According to the CVE page [2] this was fixed upstream on
January 11. This becomes critical if xmame is installed suid root.
Please mention the CVE number in the changelog when you fix this.
Thanks,
Martin
[1] http://www.securityfocus.com/archive/1/archive/1/421849/100/0/threaded
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0176
--
Martin Pitt http://www.piware.de
Ubuntu Developer http://www.ubuntu.com
Debian Developer http://www.debian.org
In a world without walls and fences, who needs Windows and Gates?
signature.asc
Description: Digital signature
--- End Message ---
--- Begin Message ---
Source: xmame
Source-Version: 0.104-1
We believe that the bug you reported is fixed in the latest version of
xmame, which is due to be installed in the Debian FTP archive:
xmame-common_0.104-1_all.deb
to pool/non-free/x/xmame/xmame-common_0.104-1_all.deb
xmame-gl_0.104-1_all.deb
to pool/non-free/x/xmame/xmame-gl_0.104-1_all.deb
xmame-sdl_0.104-1_i386.deb
to pool/non-free/x/xmame/xmame-sdl_0.104-1_i386.deb
xmame-svga_0.104-1_i386.deb
to pool/non-free/x/xmame/xmame-svga_0.104-1_i386.deb
xmame-tools_0.104-1_i386.deb
to pool/non-free/x/xmame/xmame-tools_0.104-1_i386.deb
xmame-x_0.104-1_i386.deb
to pool/non-free/x/xmame/xmame-x_0.104-1_i386.deb
xmame_0.104-1.diff.gz
to pool/non-free/x/xmame/xmame_0.104-1.diff.gz
xmame_0.104-1.dsc
to pool/non-free/x/xmame/xmame_0.104-1.dsc
xmame_0.104.orig.tar.gz
to pool/non-free/x/xmame/xmame_0.104.orig.tar.gz
xmess-common_0.104-1_all.deb
to pool/non-free/x/xmame/xmess-common_0.104-1_all.deb
xmess-sdl_0.104-1_i386.deb
to pool/non-free/x/xmame/xmess-sdl_0.104-1_i386.deb
xmess-x_0.104-1_i386.deb
to pool/non-free/x/xmame/xmess-x_0.104-1_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Bruno Barrera C. <[EMAIL PROTECTED]> (supplier of updated xmame package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Sun, 12 Mar 2006 04:42:07 -0400
Source: xmame
Binary: xmess-sdl xmame-svga xmame-gl xmame-tools xmame-x xmess-common xmess-x
xmame-sdl xmame-common
Architecture: source i386 all
Version: 0.104-1
Distribution: unstable
Urgency: low
Maintainer: Bruno Barrera C. <[EMAIL PROTECTED]>
Changed-By: Bruno Barrera C. <[EMAIL PROTECTED]>
Description:
xmame-common - Multiple Arcade Machine Emulator
xmame-gl - dummy package
xmame-sdl - SDL binaries for the Multiple Arcade Machine Emulator
xmame-svga - SVGALIB binaries for the Multiple Arcade Machine Emulator
xmame-tools - Tools for xmame and xmess
xmame-x - X binaries for the Multiple Arcade Machine Emulator
xmess-common - Support files for the Multi Emulator Super System
xmess-sdl - SDL binaries for the Multi Emulator Super System
xmess-x - X binaries for the Multi Emulator Super System
Closes: 340460 349653
Changes:
xmame (0.104-1) unstable; urgency=low
.
* New upstream release.
* Fixed exploitable buffer overflows [CVE-2006-0176].
(closes: #349653)
* Added xmess-sdl binary package. (closes: #340460)
Files:
68b8856fc637c22048aa4fd2fdd458ff 1039 non-free/games optional xmame_0.104-1.dsc
25fef26f93bdaabead05e1149c97cb35 19455213 non-free/games optional
xmame_0.104.orig.tar.gz
1ab355ca619492abceee5b7b732d2c29 16602 non-free/games optional
xmame_0.104-1.diff.gz
4b6afc1350ad4ad85332dd07380f5694 207918 non-free/games optional
xmame-common_0.104-1_all.deb
53dc54de2f689a0098dc4433d4c4dcae 4113216 non-free/games optional
xmess-common_0.104-1_all.deb
c7248ced265920fc260c42d5c2101bb1 736 non-free/games optional
xmame-gl_0.104-1_all.deb
ee1beca971f75475a00d177562c45292 10862294 non-free/games optional
xmame-x_0.104-1_i386.deb
3488bb3dc233aff1020c3b5fb622e09d 10797964 non-free/games optional
xmame-sdl_0.104-1_i386.deb
a43a63b25efd7302552cfae2fc2cbc59 57578 non-free/games optional
xmame-tools_0.104-1_i386.deb
fa194c9e15fee6c442ab31d5ee99c0f0 10804472 non-free/games optional
xmame-svga_0.104-1_i386.deb
2e18d01bdfa92f15e06cb41c148a12b1 4143658 non-free/games optional
xmess-x_0.104-1_i386.deb
ea07cf97d68987254e339ca3a4dc1853 4099360 non-free/games optional
xmess-sdl_0.104-1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
iD8DBQFEL+sXf+2upy2F5boRAteUAJ9yLOMulz8X0rV2xn/fuRW8M3iLqwCfRevC
j2Ek36qa4I7AI6QctSNoFFc=
=jEbo
-----END PGP SIGNATURE-----
--- End Message ---