Your message dated Mon, 3 Jan 2005 21:59:38 -0800 with message-id <[EMAIL PROTECTED]> and subject line KDE 3.3.1 in sarge, closes many RC bugs has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 24 Dec 2004 05:28:15 +0000 >From [EMAIL PROTECTED] Thu Dec 23 21:28:15 2004 Return-path: <[EMAIL PROTECTED]> Received: from 84-120-66-96.onocable.ono.com (chistera.yi.org) [84.120.66.96] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1Chhzr-0005QM-00; Thu, 23 Dec 2004 21:28:15 -0800 Received: from userid 1000 by chistera.yi.org with local (Exim 4.34) id 1Chhzp-00034F-MV for [EMAIL PROTECTED]; Fri, 24 Dec 2004 06:28:13 +0100 Date: Fri, 24 Dec 2004 06:28:13 +0100 From: Adeodato =?iso-8859-1?Q?Sim=F3?= <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: kdegraphics: CAN-2004-1125: kpdf buffer overflow vulnerability Message-ID: <[EMAIL PROTECTED]> Mime-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit X-No-CC: Please respect my Mail-Followup-To header User-Agent: Mutt/1.5.6+20040907i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.8 required=4.0 tests=BAYES_00,FROM_ENDS_IN_NUMS, HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: Package: kpdf Severity: grave Tags: sarge, security CAN-2004-1125 is about a buffer overflow vulnerability in xpdf. As kpdf contains a copy, it is also affected (see the KDE Security Advisory [1]). [1] http://www.kde.org/info/security/advisory-20041223-1.txt This issue has been fixed in sid with the upload of kdegraphics 4:3.3.1-2. An upload of kdelibs 4:3.3.2-0pre2 to experimental is planned, and I'm creating this bug report so that the vulnerability in sarge becomes documented. kdegraphics >= 4:3.3.1-2 is scheduled to be included in sarge "soon". -- Adeodato Simó EM: asp16 [ykwim] alu.ua.es | PK: DA6AE621 Listening to: Oasis - Champagne Supernova Old men are fond of giving good advice to console themselves for their inability to set a bad example. -- La Rochefoucauld, "Maxims" --------------------------------------- Received: (at 287080-done) by bugs.debian.org; 4 Jan 2005 05:59:38 +0000 >From [EMAIL PROTECTED] Mon Jan 03 21:59:38 2005 Return-path: <[EMAIL PROTECTED]> Received: from dsl093-039-086.pdx1.dsl.speakeasy.net (localhost.localdomain) [66.93.39.86] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1ClhjG-0002gy-00; Mon, 03 Jan 2005 21:59:38 -0800 Received: by localhost.localdomain (Postfix, from userid 1000) id C24BD1720C5; Mon, 3 Jan 2005 21:59:38 -0800 (PST) Date: Mon, 3 Jan 2005 21:59:38 -0800 From: Steve Langasek <[EMAIL PROTECTED]> To: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Cc: debian-release@lists.debian.org Subject: KDE 3.3.1 in sarge, closes many RC bugs Message-ID: <[EMAIL PROTECTED]> Mail-Followup-To: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], debian-release@lists.debian.org Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="m1UC1K4AOz1Ywdkx" Content-Disposition: inline User-Agent: Mutt/1.5.6+20040907i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-5.0 required=4.0 tests=BAYES_00,VALID_BTS_CONTROL autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: X-CrossAssassin-Score: 14 --m1UC1K4AOz1Ywdkx Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable tags 285126 -sarge tags 271256 -sarge tags 285126 -sarge tags 252670 -sarge tags 278173 +sid tags 253701 -sarge tags 247243 -sarge thanks KDE 3.3 has been accepted into testing and should be visible from the mirrors starting tomorrow. I believe all of these RC bugs can therefore be closed. Many thanks to the KDE team for their efforts in making this happen, and to Anthony Towns for handholding britney through the transition. --=20 Steve Langasek postmodern programmer --m1UC1K4AOz1Ywdkx Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFB2jDGKN6ufymYLloRAvK1AKCt069o1WpYMZLD2v/FBkFDeD+9HQCfclW7 9IlwTEOC5hGQTBoHmwTUHYQ= =GV3v -----END PGP SIGNATURE----- --m1UC1K4AOz1Ywdkx--