[Bug 332069] Re: code execution when following links

2009-02-26 Thread Jamie Strandboge
kdepim (4:3.5.2-0ubuntu6.1) dapper-security; urgency=low * SECURITY UPDATE: KMail file execution vulnerability (LP: #332069). - Add kubuntu_13_kmail_file_execution.diff patch from upstream http://websvn.kde.org/?view=rev&revision=927289 - Sets KRun to not run executables - Based on

[Bug 332069] Re: code execution when following links

2009-02-26 Thread Launchpad Bug Tracker
This bug was fixed in the package kdepim - 4:4.1.4-0ubuntu1~intrepid2.1 --- kdepim (4:4.1.4-0ubuntu1~intrepid2.1) intrepid-security; urgency=low * SECURITY UPDATE: KMail file execution vulnerability (LP: #332069). - Add kubuntu_02_kmail_file_execution.diff patch from upstream

[Bug 332069] Re: code execution when following links

2009-02-26 Thread Launchpad Bug Tracker
This bug was fixed in the package kdepim - 4:3.5.7enterprise20070926-0ubuntu2.2 --- kdepim (4:3.5.7enterprise20070926-0ubuntu2.2) gutsy-security; urgency=low * SECURITY UPDATE: KMail file execution vulnerability (LP: #332069). - Add kubuntu_13_kmail_file_execution.diff patch from

[Bug 332069] Re: code execution when following links

2009-02-26 Thread Launchpad Bug Tracker
This bug was fixed in the package kdepim - 4:3.5.10-0ubuntu1~hardy3.1 --- kdepim (4:3.5.10-0ubuntu1~hardy3.1) hardy-security; urgency=low * SECURITY UPDATE: KMail file execution vulnerability (LP: #332069). - Add kubuntu_02_kmail_file_execution.diff patch from upstream http:

[Bug 332069] Re: code execution when following links

2009-02-23 Thread Jamie Strandboge
** Changed in: kdepim (Ubuntu Dapper) Status: In Progress => Fix Committed ** Changed in: kdepim (Ubuntu Gutsy) Status: In Progress => Fix Committed ** Changed in: kdepim (Ubuntu Hardy) Status: In Progress => Fix Committed ** Changed in: kdepim (Ubuntu Intrepid) Statu

[Bug 332069] Re: code execution when following links

2009-02-23 Thread Jamie Strandboge
** Changed in: kdepim (Ubuntu Dapper) Status: New => In Progress ** Changed in: kdepim (Ubuntu Dapper) Assignee: (unassigned) => Jamie Strandboge (jdstrand) ** Changed in: kdepim (Ubuntu Gutsy) Status: New => In Progress ** Changed in: kdepim (Ubuntu Gutsy) Assignee: (una

[Bug 332069] Re: code execution when following links

2009-02-20 Thread Jonathan Riddell
Same patch as above with correct distro series set in debian/changelog ** Attachment added: "kdepim_3.5.10-0ubuntu1~hardy3.1.debdiff" http://launchpadlibrarian.net/22912958/kdepim_3.5.10-0ubuntu1%7Ehardy3.1.debdiff -- code execution when following links https://bugs.launchpad.net/bugs/332069

[Bug 332069] Re: code execution when following links

2009-02-20 Thread Jonathan Riddell
** Attachment added: "kdepim_3.5.10-0ubuntu1~hardy3.1.debdiff" http://launchpadlibrarian.net/22912828/kdepim_3.5.10-0ubuntu1%7Ehardy3.1.debdiff -- code execution when following links https://bugs.launchpad.net/bugs/332069 You received this bug notification because you are a member of Kubuntu

[Bug 332069] Re: code execution when following links

2009-02-20 Thread Jonathan Riddell
** Attachment added: "kdepim_4.1.4-0ubuntu1~intrepid2.1.debdiff" http://launchpadlibrarian.net/22912443/kdepim_4.1.4-0ubuntu1%7Eintrepid2.1.debdiff -- code execution when following links https://bugs.launchpad.net/bugs/332069 You received this bug notification because you are a member of Kub

[Bug 332069] Re: code execution when following links

2009-02-20 Thread Jonathan Riddell
SRU patch for intrepid (ignore previous one). ** Attachment added: "kdepim_4.1.4-0ubuntu1~intrepid2.1.debdiff" http://launchpadlibrarian.net/22912600/kdepim_4.1.4-0ubuntu1%7Eintrepid2.1.debdiff -- code execution when following links https://bugs.launchpad.net/bugs/332069 You received this b

[Bug 332069] Re: code execution when following links

2009-02-20 Thread Launchpad Bug Tracker
This bug was fixed in the package kdepim - 4:4.2.0-0ubuntu8 --- kdepim (4:4.2.0-0ubuntu8) jaunty; urgency=low * Add kubuntu_02_kmail_file_execution.diff, don't run executable programmes from links, LP: #332069 -- Jonathan RiddellFri, 20 Feb 2009 14:40:23 + ** Changed