Processing of kdeedu_3.4.3-2_i386.changes

2005-12-06 Thread Archive Administrator
kdeedu_3.4.3-2_i386.changes uploaded successfully to localhost along with the files: kdeedu_3.4.3-2.dsc kdeedu_3.4.3-2.diff.gz kdeedu_3.4.3-2_all.deb kdeedu-data_3.4.3-2_all.deb kdeedu-doc-html_3.4.3-2_all.deb klettres-data_3.4.3-2_all.deb kstars-data_3.4.3-2_all.deb kalzium_3.4.3-2

Bug#342215: kmail crashes very oftenly on SPARC (other KDE apps crash too, but not so often)

2005-12-06 Thread Martin Marques
Package: kmail Version: 4:3.4.2-2 Severity: critical Justification: causes serious data loss Since I upgraded KDE to 3.4.x, I'm getting unpleasant crashes on various KDE applications but the most serious, because of the frecuency in which it happens is kmail. The worst part is that, as kmail is

kdeedu_3.4.3-2_i386.changes ACCEPTED

2005-12-06 Thread Debian Installer
Accepted: kalzium_3.4.3-2_i386.deb to pool/main/k/kdeedu/kalzium_3.4.3-2_i386.deb kbruch_3.4.3-2_i386.deb to pool/main/k/kdeedu/kbruch_3.4.3-2_i386.deb kdeedu-data_3.4.3-2_all.deb to pool/main/k/kdeedu/kdeedu-data_3.4.3-2_all.deb kdeedu-doc-html_3.4.3-2_all.deb to pool/main/k/kdeedu/kdeedu

Bug#271403: marked as done (kopete: crashes when applying font-settings from chat window)

2005-12-06 Thread Debian Bug Tracking System
Your message dated Tue, 06 Dec 2005 13:51:40 +0100 with message-id <[EMAIL PROTECTED]> and subject line Closing has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen t

Bug#303598: marked as done (kopete: Disconnected from MSN)

2005-12-06 Thread Debian Bug Tracking System
Your message dated Tue, 06 Dec 2005 14:14:07 +0100 with message-id <[EMAIL PROTECTED]> and subject line Closing has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen t

Bug#262039: marked as done (kopete: crashes after adding icq contact)

2005-12-06 Thread Debian Bug Tracking System
Your message dated Tue, 06 Dec 2005 14:47:40 +0100 with message-id <[EMAIL PROTECTED]> and subject line Closing has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen t

Bug#266988: marked as done (kopete: Doesn't log in to IRC or wait for connection before sending commands)

2005-12-06 Thread Debian Bug Tracking System
Your message dated Tue, 06 Dec 2005 15:03:50 +0100 with message-id <[EMAIL PROTECTED]> and subject line Closing has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen t

Bug#342253: kicker-applets: System Monitor doesn't properly handle transparency

2005-12-06 Thread Marc Haber
Package: kicker-applets Version: 4:3.4.3-1 Severity: normal [I wasn't able to properly figure out which binary the System Monitor belongs to, and I assume that it is ktimemon. If it is not, please reassign appropriately] In a transparent panel, the System Monitor sometimes loses transparency and

Processed: gpdf, kpdf and poppler could be affected too

2005-12-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > clone 342281 -1 -2 -3 Bug#342281: xpdf-reader: security issues by iDefense Bug 342281 cloned as bugs 342286-342288. > reassign -1 gpdf Bug#342286: xpdf-reader: security issues by iDefense Bug reassigned from package `xpdf-reader' to `gpdf'. > retitle

Bug#342287: kpdf confirmed vulnerable to all latest xpdf issues

2005-12-06 Thread Moritz Muehlenhoff
tag 342287 security thanks Hi, I can confirm that kpdf is vulnerable to all the latest xpdf vulnerabilities, please mention the CVE mappings from the iDefense advisories in the changelog when fixing this. Cheers, Moritz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "u

Processed: kpdf confirmed vulnerable to all latest xpdf issues

2005-12-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > tag 342287 security Bug#342287: kpdf: source taken from xpdf may introduce heap-overflow vulnerabilities There were no tags set. Tags added: security > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking sy

Bug#342294: koffice: Exploitable heap overflows in embedded xpdf copy

2005-12-06 Thread Moritz Muehlenhoff
Package: koffice Severity: grave Tags: security Justification: user security hole Some heap overflows have been found in xpdf, of which koffice ships a local copy. It is therefore vulnerable to a subset of the xpdf issues: CVE-2005-3191: http://www.idefense.com/application/poi/display?id=342 http

Bug#342321: kgpg: cannot import key from keyserver

2005-12-06 Thread Arne Goetje
Package: kgpg Version: 4:3.4.3-2 Severity: normal When using the keyserver dialog to search for a key by name or email and a result shows up, the keyID is somehow missing. Consequently when trying to import that key an errormessage pops up that a key should be selected. Thus it is impossible to im

Processed: Reassign

2005-12-06 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > reassign 308603 kdebase-kio-plugins Bug#308603: kdebase: [KDE 3.4] disk led keep blicking since 3.4 installation Bug reassigned from package `kdebase' to `kdebase-kio-plugins'. > tags 308603 - experimental Bug#308603: kdebase: [KDE 3.4] disk led keep b