Your message dated Tue, 6 Dec 2005 15:24:12 +0100
with message-id <[EMAIL PROTECTED]>
and subject line 0.9.2-1 has been uploaded, closing the bug.
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 6 Dec 2005 12:37:34 +0000
>From [EMAIL PROTECTED] Tue Dec 06 04:37:34 2005
Return-path: <[EMAIL PROTECTED]>
Received: from smtp-02.mandic.com.br ([200.225.81.133])
        by spohr.debian.org with esmtp (Exim 4.50)
        id 1Ejc4c-0005Yv-Ea
        for [EMAIL PROTECTED]; Tue, 06 Dec 2005 04:37:34 -0800
Received: (qmail 18561 invoked from network); 6 Dec 2005 12:37:00 -0000
Received: from unknown (HELO [128.1.1.78]) ([EMAIL PROTECTED])
          (envelope-sender <[EMAIL PROTECTED]>)
          by smtp-02.mandic.com.br (qmail-ldap-1.03) with RC4-MD5 encrypted SMTP
          for <[EMAIL PROTECTED]>; 6 Dec 2005 12:37:00 -0000
Message-ID: <[EMAIL PROTECTED]>
Date: Tue, 06 Dec 2005 10:36:54 -0200
From: Daniel Serodio <[EMAIL PROTECTED]>
User-Agent: Thunderbird 1.5 (Windows/20051025)
MIME-Version: 1.0
To: [EMAIL PROTECTED]
Subject: (Another) SQL Injection Vulnerability
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
X-Remote-IP: 200.144.149.31
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: trac
Version: 0.9.1-2
Severity: grave
Tags: security

What's New
----------
A brief summary of major changes for version 0.9.2:

 * Fix for an SQL injection vulnerability in the search module.
(http://projects.edgewall.com/trac/changeset/2605)
 * Fix for broken email ticket notifications.

For a more complete list of improvements, see the ChangeLog at:

 <http://projects.edgewall.com/trac/wiki/ChangeLog>

Thanks,
Daniel Serodio

---------------------------------------
Received: (at 342232-done) by bugs.debian.org; 6 Dec 2005 14:24:08 +0000
>From [EMAIL PROTECTED] Tue Dec 06 06:24:08 2005
Return-path: <[EMAIL PROTECTED]>
Received: from [213.229.161.46] (helo=erconde.hispalinux.es)
        by spohr.debian.org with esmtp (Exim 4.50)
        id 1Ejdjk-0005T3-FE
        for [EMAIL PROTECTED]; Tue, 06 Dec 2005 06:24:08 -0800
Received: by erconde.hispalinux.es (Postfix, from userid 1000)
        id 2D9A4FF08; Tue,  6 Dec 2005 15:24:12 +0100 (CET)
Date: Tue, 6 Dec 2005 15:24:12 +0100
From: Jesus Climent <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: 0.9.2-1 has been uploaded, closing the bug.
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.5.9i
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no 
        version=2.60-bugs.debian.org_2005_01_02

The problems described were closed in the upload of 0.9.2-1 yesterday. Today
it will be available in the archive.

Cheers,
-- 
Jesus Climent                                      info:www.pumuki.org
Unix SysAdm|Linux User #66350|Debian Developer|2.6.14|Helsinki Finland
GPG: 1024D/86946D69 BB64 2339 1CAA 7064 E429  7E18 66FC 1D7F 8694 6D69

Congratulations. You are still alive. Most people are so ungrateful to be
alive. But not you. Not anymore.
                --John (Saw)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to