Your message dated Wed, 17 May 2006 03:32:17 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#362575: fixed in amaya 9.51-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: amaya
Severity: grave
Tags: security
Justification: user security hole

Two exploitable buffer overflows have been found in Amaya. Please
see these URLs for details:
http://morph3us.org/advisories/20060412-amaya-94.txt
http://morph3us.org/advisories/20060412-amaya-94-2.txt

Cheers,
        Moritz

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.16-1-686
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)


--- End Message ---
--- Begin Message ---
Source: amaya
Source-Version: 9.51-1

We believe that the bug you reported is fixed in the latest version of
amaya, which is due to be installed in the Debian FTP archive:

amaya_9.51-1.diff.gz
  to pool/main/a/amaya/amaya_9.51-1.diff.gz
amaya_9.51-1.dsc
  to pool/main/a/amaya/amaya_9.51-1.dsc
amaya_9.51-1_i386.deb
  to pool/main/a/amaya/amaya_9.51-1_i386.deb
amaya_9.51.orig.tar.gz
  to pool/main/a/amaya/amaya_9.51.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Anand Kumria <[EMAIL PROTECTED]> (supplier of updated amaya package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 15 May 2006 19:42:54 +0100
Source: amaya
Binary: amaya
Architecture: source i386
Version: 9.51-1
Distribution: unstable
Urgency: low
Maintainer: Regis Boudin <[EMAIL PROTECTED]>
Changed-By: Anand Kumria <[EMAIL PROTECTED]>
Description: 
 amaya      - Web Browser, HTML Editor and Testbed for Draft W3C standards
Closes: 362575 362723 366597 366600 367300
Changes: 
 amaya (9.51-1) unstable; urgency=low
 .
   * New upstream release
     + Fixes two buffer overflows, CVE-2006-1900. (Closes: #362575)
   * use_debian_fonts.diff : Stop shipping Freefonts, depend on ttf-freefonts
     instead.
   * link_with_libtool.diff : use libtool for linking. Since we use the Debian
     version, it will remove lots of unnecessary dependencies.
   * Fix typo in debian/control. Thanks Simon Waters (Closes: #362723)
   * Update manpage to actually list the options and reference the
     documentation. (Closes: #366600)
   * Correctly document where the documentation is (Closes: #366597)
   * Use $HOME/.amaya-$USER as a lock file instead of $HOME/amaya-$USER
     (Closes: #367300)
   * Remove patch to use the system libWWW until it works for sure.
   * Stop providing freefonts. A patch has been submitted and merged
     upstream to use the Debian-provided ones. Depend on ttf-freefont so
     we actually have some fonts to display.
Files: 
 c7cd31a0b11d75e0fdd17870181407e0 879 web optional amaya_9.51-1.dsc
 2aa30c99346542d58032557307e330a0 25112441 web optional amaya_9.51.orig.tar.gz
 6a5c6211ebc1defb385fcc8afa79e17d 304847 web optional amaya_9.51-1.diff.gz
 3cd72a5f68a6ba729cb45a3117879124 5676870 web optional amaya_9.51-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iQCVAwUBRGoTJWRmcAD8BdppAQJuAAP/ZznaGJLhMk3oM1Z63to8/uhw5+8/KwZp
4qV84maDC3lOhp/dx9xwsJ+EaAxzx53u5bhptTV0bFrL0YC6JugunTMgR8RgMYkr
3144vYc+PJGDPaMBLhQ42hLsQ4lTrw2J0SyYNwqlzm/fmSfjRM8D4U3QprCu98s5
1WCX0Nr3BNE=
=y/dt
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to