Debian Bug report logs -
#598303
tau: CVE-2010-3382: insecure library loading
Reported by: Raphael Geissert <geissert@debian.org>
Date: Tue, 28 Sep 2010 04:25:09 UTC
Severity: grave
Tags: patch, security
Found in version tau/2.16.4-1.3
Fixed in version tau/2.16.4-1.4
Done: Anibal Monsalve Salazar <anibal@debian.org>
Bug is archived. No further changes may be made.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, Yann Dirson <dirson@debian.org>
:
Bug#598303
; Package tau
.
(Tue, 28 Sep 2010 04:25:12 GMT) (full text, mbox, link).
Acknowledgement sent
to Raphael Geissert <geissert@debian.org>
:
New Bug report received and forwarded. Copy sent to Yann Dirson <dirson@debian.org>
.
(Tue, 28 Sep 2010 04:25:12 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Package: tau
Version: 2.16.4-1.3
Severity: grave
Tags: security
User: team@security.debian.org
Usertags: ldpath
Hello,
During a review of the Debian archive, I've found your package to
contain a script that can be abused by an attacker to execute arbitrary
code.
The vulnerability is introduced by an insecure change to
LD_LIBRARY_PATH, and environment variable used by ld.so(8) to look for
libraries on a directory other than the standard paths.
Vulnerable code follows:
/usr/bin/tauex line 197:
export LD_LIBRARY_PATH=$TAUROOT/$TAUARCH/lib/$theBinding:$LD_LIBRARY_PATH
When there's an empty item on the colon-separated list of
LD_LIBRARY_PATH, ld.so treats it as '.' (i.e. CWD/$PWD.)
If the given script is executed from a directory where a potential,
local, attacker can write files to, there's a chance to exploit this
bug.
This vulnerability has been assigned the CVE id CVE-2010-3382. Please make sure
you mention it when forwarding this report to upstream and when fixing
this bug (everywhere: upstream and here at Debian.)
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3382
[1] http://security-tracker.debian.org/tracker/CVE-2010-3382
Sincerely,
Raphael Geissert
Added tag(s) patch.
Request was from Aníbal Monsalve Salazar <anibal@debian.org>
to control@bugs.debian.org
.
(Wed, 06 Oct 2010 10:45:12 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Yann Dirson <dirson@debian.org>
:
Bug#598303
; Package tau
.
(Wed, 06 Oct 2010 10:57:02 GMT) (full text, mbox, link).
Acknowledgement sent
to Aníbal Monsalve Salazar <anibal@debian.org>
:
Extra info received and forwarded to list. Copy sent to Yann Dirson <dirson@debian.org>
.
(Wed, 06 Oct 2010 10:57:02 GMT) (full text, mbox, link).
Message #12 received at 598303@bugs.debian.org (full text, mbox, reply):
package tau
tags 598303 + patch
stop
debdiff tau_2.16.4-1.3.dsc tau_2.16.4-1.4.dsc | diffstat
debian/patches/06-598303-CVE-2010-3382-insecure-library-loading.diff | 59 ++++++++++
tau-2.16.4/debian/changelog | 9 +
tau-2.16.4/debian/patches/series | 1
3 files changed, 69 insertions(+)
debdiff tau_2.16.4-1.3.dsc tau_2.16.4-1.4.dsc
diff -u tau-2.16.4/debian/changelog tau-2.16.4/debian/changelog
--- tau-2.16.4/debian/changelog
+++ tau-2.16.4/debian/changelog
@@ -1,3 +1,12 @@
+tau (2.16.4-1.4) unstable; urgency=low
+
+ * Non-maintainer upload.
+ * Fix CVE-2010-3382 insecure library loading
+ Add debian/patches/06-598303-CVE-2010-3382-insecure-library-loading.diff
+ Closes: 598303
+
+ -- Anibal Monsalve Salazar <anibal@debian.org> Wed, 06 Oct 2010 20:55:41 +1100
+
tau (2.16.4-1.3) unstable; urgency=low
* Non-maintainer upload
diff -u tau-2.16.4/debian/patches/series tau-2.16.4/debian/patches/series
--- tau-2.16.4/debian/patches/series
+++ tau-2.16.4/debian/patches/series
@@ -6,0 +7 @@
+06-598303-CVE-2010-3382-insecure-library-loading.diff
only in patch4:
unchanged:
--- tau-2.16.4.orig/debian/patches/06-598303-CVE-2010-3382-insecure-library-loading.diff
+++ tau-2.16.4/debian/patches/06-598303-CVE-2010-3382-insecure-library-loading.diff
@@ -0,0 +1,59 @@
+http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3382
+http://security-tracker.debian.org/tracker/CVE-2010-3382
+http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598303
+
+Raphael Geissert have found that this package contains a script that
+can be abused by an attacker to execute arbitrary code.
+
+The vulnerability is introduced by an insecure change to
+LD_LIBRARY_PATH, and environment variable used by ld.so(8) to look for
+libraries on a directory other than the standard paths.
+
+Vulnerable code follows:
+
+/usr/bin/tauex line 197:
+export LD_LIBRARY_PATH=$TAUROOT/$TAUARCH/lib/$theBinding:$LD_LIBRARY_PATH
+
+When there's an empty item on the colon-separated list of
+LD_LIBRARY_PATH, ld.so treats it as '.' (i.e. CWD/$PWD.)
+If the given script is executed from a directory where a potential,
+local, attacker can write files to, there's a chance to exploit this
+bug.
+
+Patch by Anibal Monsalve Salazar <anibal@debian.org>
+
+--- a/tools/src/tauex.in 2007-05-19 09:04:55.000000000 +1000
++++ b/tools/src/tauex.in 2010-10-06 19:03:38.000000000 +1100
+@@ -194,7 +194,31 @@ for c in $Counters ; do
+ done
+
+
+-export LD_LIBRARY_PATH=$TAUROOT/$TAUARCH/lib/$theBinding:$LD_LIBRARY_PATH
++add_dir()
++{
++ local dir
++ dir="$1";
++
++ if [ -n "$dir" ]
++ then
++ case "$LD_LIBRARY_PATH" in
++ "$dir"|"$dir":*|*:"$dir"|*:"$dir":*)
++ # already already_in $LD_LIBRARY_PATH
++ ;;
++ "")
++ # $LD_LIBRARY_PATH is empty, don't add a separator
++ LD_LIBRARY_PATH="$dir"
++ ;;
++ *)
++ # add $dir
++ LD_LIBRARY_PATH="$dir":"$LD_LIBRARY_PATH"
++ ;;
++ esac
++ fi
++ echo "$LD_LIBRARY_PATH"
++}
++
++export LD_LIBRARY_PATH="$( add_dir "$TAUROOT/$TAUARCH/lib/$theBinding" )"
+
+ if [ $verbose = "true" ] ; then
+ echo "Matching bindings: $bindings"
Information forwarded
to debian-bugs-dist@lists.debian.org, Yann Dirson <dirson@debian.org>
:
Bug#598303
; Package tau
.
(Wed, 06 Oct 2010 11:12:02 GMT) (full text, mbox, link).
Acknowledgement sent
to Julien Cristau <jcristau@debian.org>
:
Extra info received and forwarded to list. Copy sent to Yann Dirson <dirson@debian.org>
.
(Wed, 06 Oct 2010 11:12:02 GMT) (full text, mbox, link).
Message #17 received at 598303@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
On Wed, Oct 6, 2010 at 10:43:08 +0000, Aníbal Monsalve Salazar wrote:
> +--- a/tools/src/tauex.in 2007-05-19 09:04:55.000000000 +1000
> ++++ b/tools/src/tauex.in 2010-10-06 19:03:38.000000000 +1100
> +@@ -194,7 +194,31 @@ for c in $Counters ; do
> + done
> +
> +
> +-export LD_LIBRARY_PATH=$TAUROOT/$TAUARCH/lib/$theBinding:$LD_LIBRARY_PATH
> ++add_dir()
> ++{
> ++ local dir
> ++ dir="$1";
> ++
> ++ if [ -n "$dir" ]
> ++ then
> ++ case "$LD_LIBRARY_PATH" in
> ++ "$dir"|"$dir":*|*:"$dir"|*:"$dir":*)
> ++ # already already_in $LD_LIBRARY_PATH
> ++ ;;
> ++ "")
> ++ # $LD_LIBRARY_PATH is empty, don't add a separator
> ++ LD_LIBRARY_PATH="$dir"
> ++ ;;
> ++ *)
> ++ # add $dir
> ++ LD_LIBRARY_PATH="$dir":"$LD_LIBRARY_PATH"
> ++ ;;
> ++ esac
> ++ fi
> ++ echo "$LD_LIBRARY_PATH"
> ++}
> ++
> ++export LD_LIBRARY_PATH="$( add_dir "$TAUROOT/$TAUARCH/lib/$theBinding" )"
> +
> + if [ $verbose = "true" ] ; then
> + echo "Matching bindings: $bindings"
>
Yay overengineering.
What's wrong with a simple
export LD_LIBRARY_PATH="$TAUROOT/$TAUARCH/lib/$thebinding${LD_LIBRARY_PATH:+:$LD_LIBRARY_PATH}"
?
Cheers,
Julien
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Yann Dirson <dirson@debian.org>
:
Bug#598303
; Package tau
.
(Wed, 06 Oct 2010 11:39:08 GMT) (full text, mbox, link).
Acknowledgement sent
to Aníbal Monsalve Salazar <anibal@debian.org>
:
Extra info received and forwarded to list. Copy sent to Yann Dirson <dirson@debian.org>
.
(Wed, 06 Oct 2010 11:39:08 GMT) (full text, mbox, link).
Message #22 received at 598303@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
> Yay overengineering.
>
> What's wrong with a simple
> export LD_LIBRARY_PATH="$TAUROOT/$TAUARCH/lib/$thebinding${LD_LIBRARY_PATH:+:$LD_LIBRARY_PATH}"
> ?
In the general case where you have a $foo before
${LD_LIBRARY_PATH:+:$LD_LIBRARY_PATH}
the result is not good if $foo is empty.
See for example:
set -x
LD_LIBRARY_PATH="/lib"; LD_LIBRARY_PATH="$foo${LD_LIBRARY_PATH:+:$LD_LIBRARY_PATH}"
+ LD_LIBRARY_PATH=/lib
+ LD_LIBRARY_PATH=:/lib
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Yann Dirson <dirson@debian.org>
:
Bug#598303
; Package tau
.
(Wed, 06 Oct 2010 11:42:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Julien Cristau <jcristau@debian.org>
:
Extra info received and forwarded to list. Copy sent to Yann Dirson <dirson@debian.org>
.
(Wed, 06 Oct 2010 11:42:05 GMT) (full text, mbox, link).
Message #27 received at 598303@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
On Wed, Oct 6, 2010 at 11:37:15 +0000, Aníbal Monsalve Salazar wrote:
> > Yay overengineering.
> >
> > What's wrong with a simple
> > export LD_LIBRARY_PATH="$TAUROOT/$TAUARCH/lib/$thebinding${LD_LIBRARY_PATH:+:$LD_LIBRARY_PATH}"
> > ?
>
> In the general case where you have a $foo before
> ${LD_LIBRARY_PATH:+:$LD_LIBRARY_PATH}
> the result is not good if $foo is empty.
>
> See for example:
>
> set -x
> LD_LIBRARY_PATH="/lib"; LD_LIBRARY_PATH="$foo${LD_LIBRARY_PATH:+:$LD_LIBRARY_PATH}"
> + LD_LIBRARY_PATH=/lib
> + LD_LIBRARY_PATH=:/lib
This makes absolutely no sense. "$TAUROOT/$TAUARCH/lib/$thebinding is
not empty.
Cheers,
Julien
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Yann Dirson <dirson@debian.org>
:
Bug#598303
; Package tau
.
(Wed, 06 Oct 2010 11:57:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Aníbal Monsalve Salazar <anibal@debian.org>
:
Extra info received and forwarded to list. Copy sent to Yann Dirson <dirson@debian.org>
.
(Wed, 06 Oct 2010 11:57:03 GMT) (full text, mbox, link).
Message #32 received at 598303@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
On Wed, Oct 06, 2010 at 01:40:51PM +0200, Julien Cristau wrote:
>This makes absolutely no sense. "$TAUROOT/$TAUARCH/lib/$thebinding is
>not empty.
I know that.
I was talking about a general case where you have just one variable.
See the end of
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598549#35
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Yann Dirson <dirson@debian.org>
:
Bug#598303
; Package tau
.
(Wed, 06 Oct 2010 23:27:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Aníbal Monsalve Salazar <anibal@debian.org>
:
Extra info received and forwarded to list. Copy sent to Yann Dirson <dirson@debian.org>
.
(Wed, 06 Oct 2010 23:27:03 GMT) (full text, mbox, link).
Message #37 received at 598303@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
A new patchset is below.
debdiff tau_2.16.4-1.3.dsc tau_2.16.4-1.4.dsc | diffstat
debian/patches/06-598303-CVE-2010-3382-insecure-library-loading.diff | 35 ++++++++++
tau-2.16.4/debian/changelog | 9 ++
tau-2.16.4/debian/patches/series | 1
3 files changed, 45 insertions(+)
debdiff tau_2.16.4-1.3.dsc tau_2.16.4-1.4.dsc
diff -u tau-2.16.4/debian/changelog tau-2.16.4/debian/changelog
--- tau-2.16.4/debian/changelog
+++ tau-2.16.4/debian/changelog
@@ -1,3 +1,12 @@
+tau (2.16.4-1.4) unstable; urgency=low
+
+ * Non-maintainer upload.
+ * Fix CVE-2010-3382 insecure library loading
+ Add debian/patches/06-598303-CVE-2010-3382-insecure-library-loading.diff
+ Closes: 598303
+
+ -- Anibal Monsalve Salazar <anibal@debian.org> Wed, 06 Oct 2010 20:55:41 +1100
+
tau (2.16.4-1.3) unstable; urgency=low
* Non-maintainer upload
diff -u tau-2.16.4/debian/patches/series tau-2.16.4/debian/patches/series
--- tau-2.16.4/debian/patches/series
+++ tau-2.16.4/debian/patches/series
@@ -6,0 +7 @@
+06-598303-CVE-2010-3382-insecure-library-loading.diff
only in patch4:
unchanged:
--- tau-2.16.4.orig/debian/patches/06-598303-CVE-2010-3382-insecure-library-loading.diff
+++ tau-2.16.4/debian/patches/06-598303-CVE-2010-3382-insecure-library-loading.diff
@@ -0,0 +1,35 @@
+http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3382
+http://security-tracker.debian.org/tracker/CVE-2010-3382
+http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598303
+
+Raphael Geissert have found that this package contains a script that
+can be abused by an attacker to execute arbitrary code.
+
+The vulnerability is introduced by an insecure change to
+LD_LIBRARY_PATH, and environment variable used by ld.so(8) to look for
+libraries on a directory other than the standard paths.
+
+Vulnerable code follows:
+
+/usr/bin/tauex line 197:
+export LD_LIBRARY_PATH=$TAUROOT/$TAUARCH/lib/$theBinding:$LD_LIBRARY_PATH
+
+When there's an empty item on the colon-separated list of
+LD_LIBRARY_PATH, ld.so treats it as '.' (i.e. CWD/$PWD.)
+If the given script is executed from a directory where a potential,
+local, attacker can write files to, there's a chance to exploit this
+bug.
+
+Patch by Julien Cristau <jcristau@debian.org>
+
+--- a/tools/src/tauex.in 2007-05-19 09:04:55.000000000 +1000
++++ b/tools/src/tauex.in 2010-10-06 19:03:38.000000000 +1100
+@@ -194,7 +194,7 @@ for c in $Counters ; do
+ done
+
+
+-export LD_LIBRARY_PATH=$TAUROOT/$TAUARCH/lib/$theBinding:$LD_LIBRARY_PATH
++export LD_LIBRARY_PATH="$TAUROOT/$TAUARCH/lib/$thebinding${LD_LIBRARY_PATH:+:$LD_LIBRARY_PATH}"
+
+ if [ $verbose = "true" ] ; then
+ echo "Matching bindings: $bindings"
[signature.asc (application/pgp-signature, inline)]
Reply sent
to Anibal Monsalve Salazar <anibal@debian.org>
:
You have taken responsibility.
(Thu, 07 Oct 2010 01:21:03 GMT) (full text, mbox, link).
Notification sent
to Raphael Geissert <geissert@debian.org>
:
Bug acknowledged by developer.
(Thu, 07 Oct 2010 01:21:03 GMT) (full text, mbox, link).
Message #42 received at 598303-close@bugs.debian.org (full text, mbox, reply):
Source: tau
Source-Version: 2.16.4-1.4
We believe that the bug you reported is fixed in the latest version of
tau, which is due to be installed in the Debian FTP archive:
python-tau_2.16.4-1.4_mipsel.deb
to main/t/tau/python-tau_2.16.4-1.4_mipsel.deb
tau-examples_2.16.4-1.4_all.deb
to main/t/tau/tau-examples_2.16.4-1.4_all.deb
tau-racy_2.16.4-1.4_all.deb
to main/t/tau/tau-racy_2.16.4-1.4_all.deb
tau_2.16.4-1.4.diff.gz
to main/t/tau/tau_2.16.4-1.4.diff.gz
tau_2.16.4-1.4.dsc
to main/t/tau/tau_2.16.4-1.4.dsc
tau_2.16.4-1.4_mipsel.deb
to main/t/tau/tau_2.16.4-1.4_mipsel.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 598303@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Anibal Monsalve Salazar <anibal@debian.org> (supplier of updated tau package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Wed, 06 Oct 2010 20:55:41 +1100
Source: tau
Binary: tau tau-racy python-tau tau-examples
Architecture: source all mipsel
Version: 2.16.4-1.4
Distribution: unstable
Urgency: low
Maintainer: Yann Dirson <dirson@debian.org>
Changed-By: Anibal Monsalve Salazar <anibal@debian.org>
Description:
python-tau - Tuning and Analysis Utilities - support for python bindings
tau - Tuning and Analysis Utilities - base profiling toolkit
tau-examples - Tuning and Analysis Utilities - examples
tau-racy - Tuning and Analysis Utilities - Tcl/tk profiler GUI
Closes: 598303
Changes:
tau (2.16.4-1.4) unstable; urgency=low
.
* Non-maintainer upload.
* Fix CVE-2010-3382 insecure library loading
Add debian/patches/06-598303-CVE-2010-3382-insecure-library-loading.diff
Closes: 598303
Checksums-Sha1:
591d069f2a7f96e5323e0bd23f6804dc83f98b02 1706 tau_2.16.4-1.4.dsc
0bc14f478887e8d44c260c97e8ac8cd80e4e8bc3 15225 tau_2.16.4-1.4.diff.gz
95fa9b058fc93687625f473a5ac5aec1ba41ca43 110926 tau-racy_2.16.4-1.4_all.deb
38d94b961b142777a48d58bfe3a65c0c967c2a81 140708 tau-examples_2.16.4-1.4_all.deb
bef3c60990df378f5e02daa200d00894185c2f08 411082 tau_2.16.4-1.4_mipsel.deb
e1d99b54b5146224e3e07d315e7a8db62ce7b626 31122 python-tau_2.16.4-1.4_mipsel.deb
Checksums-Sha256:
fc8a73b7ca43f5e952ec2b3e3b99d3d168b47b8514a50c2ab814d38902445d42 1706 tau_2.16.4-1.4.dsc
a34f6d861d30aca6c84c72670d851e8c55946b4f0e1d89a46bb5ec5dbcf34e75 15225 tau_2.16.4-1.4.diff.gz
b441d8f62cbd620ed62c4da2c3230dc21d7eca325cae49b1d724c45bd7cb5fe4 110926 tau-racy_2.16.4-1.4_all.deb
d7a916c8e08f8ffac437e795d5662a07349d6b2c15d1b03206a1748b640bf2e4 140708 tau-examples_2.16.4-1.4_all.deb
5b872f311316b3643451f69aa57be5f5bb9c8292b8f01d498d35f91918eebdd8 411082 tau_2.16.4-1.4_mipsel.deb
3db8b2f80da2f0f5156f6f14e9a0f39c44d41e1a6ad030766c8f182fadc0cb18 31122 python-tau_2.16.4-1.4_mipsel.deb
Files:
7722eaa2960d2666bd9f4567f220fd74 1706 devel optional tau_2.16.4-1.4.dsc
f31d7baa5458c1394b6ba73382c80f33 15225 devel optional tau_2.16.4-1.4.diff.gz
d7e267b83726099dd117055986a44210 110926 devel optional tau-racy_2.16.4-1.4_all.deb
80cb6c2b589a708b744fd66db249d115 140708 devel optional tau-examples_2.16.4-1.4_all.deb
d73d5fd45cedaed5c32efb27464a4fd2 411082 devel optional tau_2.16.4-1.4_mipsel.deb
777c652a984dc9224171e13d7db907d6 31122 python optional python-tau_2.16.4-1.4_mipsel.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iQIcBAEBCAAGBQJMrR08AAoJEHxWrP6UeJfYTuMQAJGgKR9FIohkUjUdUFuG03X2
YUpu6m+xr7Es9pZ7pj3UCrn0kb4Gs6I3ItxxWAo/V+BLtFkOeE6yCzazkyqGC61e
ZD/tiqbdvwDVevDxzPAO7uKdi/YNp5YBnLP6yKWTihVNJznth/2HxNuOTB9DHr0S
e/NDjrjbBz8bHQokT5W4f99xm9fcbVtVFzyvv1m98VKKwnEegVP9dBgaUxan5qGj
bm8nRRBXxyhRRhOLdthE9saz4dHtmzgri5YLF+zhlCuEwEyizNfw2jFY8bB4MNeQ
Dq+jNqzAAGSuyitNNhI6FdlMOFUyj548mVH+DDv9MU9JgSXbbHkFMJYix5r7rBJQ
jyod+Cc71SkzLjewkfOmS9CmcWmbdZE/k1suGm3qjxK/6Pkrk35CneBnbmIWu6N/
FUJ2RYUdq9bXljCub59nxwEQH0m+uK6b3HbG7hpO+KtVVnf1flo0bfiz7XCZYSb6
BsOUQe8oM6PxOzsyTg41PCv+jzeevWgnupdlBp/VF9O+6hBeEBuZYXhnkOJSAgxQ
DMc/9FZ9Aoj/SLKAFNvLHGGK7zLwwVaE4JYz2KBqNYhTauwnPtW+qtKmgdRtV+Bo
5fd2OtdHdsaDkjgcwX9s7a3GpWdgM3yAnxbqRcuE46UPXk66scCQmphaODb+O5AA
WNwmpZZQgonfoF5bG9Qr
=Jfg/
-----END PGP SIGNATURE-----
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org
.
(Sun, 14 Nov 2010 07:30:06 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Wed Jun 19 15:13:44 2019;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.