Processed: fixed package has reached testing

2005-02-17 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tags 291251 -sarge
Bug#291251: CAN-2005-0064: Arbitrary code execution in kpdf
Tags were: sarge security patch
Bug#291270: kpdf: vulnerable to CAN-2005-0064, buffer overflow in xpdf
Tags removed: sarge

> close 291251
Bug#291251: CAN-2005-0064: Arbitrary code execution in kpdf
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug#291270: kpdf: vulnerable to CAN-2005-0064, buffer overflow in xpdf
Bug closed, send any further explanations to Martin Schulze <[EMAIL PROTECTED]>

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Processed: fixed package has reached testing

2005-01-21 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tags 291064 + sid fixed
Bug#291064: Arbitrary command execution
Tags were: patch sarge security
Bug#291306: awstats: possible remote command execution vulnerability (iDEFENSE)
Tags added: sid, fixed

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]