Debian Bug report logs -
#439335
CVE-2007-4131: GNU tar Directory Traversal Vulnerability
Reported by: Luca Bruno <luca.br@uno.it>
Date: Fri, 24 Aug 2007 09:42:02 UTC
Severity: important
Tags: patch, security, upstream
Found in versions tar/1.18-1, tar/1.16-2
Fixed in versions tar/1.18-2, tar/1.14-2.4, tar/1.16-2etch4
Done: Florian Weimer <fw@deneb.enyo.de>
Bug is archived. No further changes may be made.
Toggle useless messages
Report forwarded to debian-bugs-dist@lists.debian.org, Debian Security Team <team@security.debian.org>, Bdale Garbee <bdale@gag.com>
:
Bug#439335
; Package tar
.
(full text, mbox, link).
Acknowledgement sent to Luca Bruno <luca.br@uno.it>
:
New Bug report received and forwarded. Copy sent to Debian Security Team <team@security.debian.org>, Bdale Garbee <bdale@gag.com>
.
(full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Package: tar
Version: 1.18-1
Severity: grave
Tags: security patch
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- From CVE-2007-4131:
"The vulnerability is caused due to an input validation error when
extracting tar archives. This can be exploited to extract files to
arbitrary locations outside the specified directory with the permissions
of the user running GNU tar by using the ".." directory traversal
sequence in a specially crafted tar archive."
A patch is available in upstream CVS:
http://cvs.savannah.gnu.org/viewvc/tar/src/names.c?root=tar&r1=1.63&r2=1.64
The same portion of code is present also in versions 1.16 (stable) and
1.14 (oldstable), so this bug should be probably tracked and fixed there
too. However I'm not sure if there are other patches already applied
there to prevent this issue, so right now I'm reporting this bug for sid
only.
Cheers, Luca
- -- System Information:
Debian Release: lenny/sid
APT prefers unstable
APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.20-1-686 (SMP w/1 CPU core)
Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Versions of packages tar depends on:
ii libc6 2.6.1-1 GNU C Library: Shared libraries
tar recommends no packages.
- -- no debconf information
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFGzqZaRqobajv7n7MRAhfjAJ9PQ+ZxxO5cOhE5FZMWLl/V84qdtACgqoy6
Cn3M2jeuQ0UM9BUXqxUsPrQ=
=mvHJ
-----END PGP SIGNATURE-----
Information forwarded to debian-bugs-dist@lists.debian.org
:
Bug#439335
; Package tar
.
(full text, mbox, link).
Acknowledgement sent to Bdale Garbee <bdale@gag.com>
:
Extra info received and forwarded to list.
(full text, mbox, link).
Message #10 received at submit@bugs.debian.org (full text, mbox, reply):
On Fri, 2007-08-24 at 11:35 +0200, Luca Bruno wrote:
> Package: tar
> Version: 1.18-1
> Severity: grave
Why does this merit a 'grave' severity when there is no apparent priv
escalation involved?
Bdale
Information forwarded to debian-bugs-dist@lists.debian.org
:
Bug#439335
; Package tar
.
(full text, mbox, link).
Acknowledgement sent to Bdale Garbee <bdale@gag.com>
:
Extra info received and forwarded to list.
(full text, mbox, link).
Bug marked as found in version 1.16-2.
Request was from Filipus Klutiero <chealer@gmail.com>
to control@bugs.debian.org
.
(Wed, 29 Aug 2007 06:06:02 GMT) (full text, mbox, link).
Tags added: upstream
Request was from Filipus Klutiero <chealer@gmail.com>
to control@bugs.debian.org
.
(Wed, 29 Aug 2007 06:06:02 GMT) (full text, mbox, link).
Information forwarded to debian-bugs-dist@lists.debian.org, Bdale Garbee <bdale@gag.com>
:
Bug#439335
; Package tar
.
(full text, mbox, link).
Acknowledgement sent to Stefan Fritsch <sf@sfritsch.de>
:
Extra info received and forwarded to list. Copy sent to Bdale Garbee <bdale@gag.com>
.
(full text, mbox, link).
Message #24 received at 439335@bugs.debian.org (full text, mbox, reply):
A user does not expect tar to allow absolute path names unless the -P
option is given.
Severity set to `important' from `grave'
Request was from bdale@gag.com (Bdale Garbee)
to control@bugs.debian.org
.
(Wed, 29 Aug 2007 19:18:02 GMT) (full text, mbox, link).
Information forwarded to debian-bugs-dist@lists.debian.org
:
Bug#439335
; Package tar
.
(full text, mbox, link).
Acknowledgement sent to Bdale Garbee <bdale@gag.com>
:
Extra info received and forwarded to list.
(full text, mbox, link).
Message #31 received at 439335@bugs.debian.org (full text, mbox, reply):
tags 439335 +pending
thanks
On Wed, 2007-08-29 at 20:50 +0200, Stefan Fritsch wrote:
> A user does not expect tar to allow absolute path names unless the -P
> option is given.
That's not a justification for severity 'grave' in the Debian BTS.
However, regardless of what we think the appropriate bug severity is,
I've just applied the patch in question in my tree and expect to upload
it soonish.
Bdale
Tags added: pending
Request was from Bdale Garbee <bdale@gag.com>
to control@bugs.debian.org
.
(Wed, 29 Aug 2007 19:27:02 GMT) (full text, mbox, link).
Reply sent to Bdale Garbee <bdale@gag.com>
:
You have taken responsibility.
(full text, mbox, link).
Notification sent to Luca Bruno <luca.br@uno.it>
:
Bug acknowledged by developer.
(full text, mbox, link).
Message #38 received at 439335-close@bugs.debian.org (full text, mbox, reply):
Source: tar
Source-Version: 1.18-2
We believe that the bug you reported is fixed in the latest version of
tar, which is due to be installed in the Debian FTP archive:
tar_1.18-2.diff.gz
to pool/main/t/tar/tar_1.18-2.diff.gz
tar_1.18-2.dsc
to pool/main/t/tar/tar_1.18-2.dsc
tar_1.18-2_i386.deb
to pool/main/t/tar/tar_1.18-2_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 439335@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Bdale Garbee <bdale@gag.com> (supplier of updated tar package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Wed, 05 Sep 2007 10:20:45 +0100
Source: tar
Binary: tar
Architecture: source i386
Version: 1.18-2
Distribution: unstable
Urgency: high
Maintainer: Bdale Garbee <bdale@gag.com>
Changed-By: Bdale Garbee <bdale@gag.com>
Description:
tar - GNU tar
Closes: 433553 439335 439916
Changes:
tar (1.18-2) unstable; urgency=high
.
* patch from Neil Moore improving the man page, closes: #439916
* patch from Justin Pryzby improving the man page, closes: #433553
* patch from upstream to fix directory traversal concern on extraction
documented in (CVE-2007-4131), closes: #439335
* urgency to high since preceding bug has having security implications
Files:
87af661dc549fb89e70d4f8850859cd4 569 utils required tar_1.18-2.dsc
7bcd67a71acb9d4c4e6b9ababc309ef9 40112 utils required tar_1.18-2.diff.gz
d6c6861cbbf9a04cba3519f8f265d243 732978 utils required tar_1.18-2_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFG3oA+ZKfAp/LPAagRAnQKAJwLlYJ+ar/e8eree7HkcoSPTv9LywCfWxL+
320FXmkTEdoJohy87O9D964=
=Ae4x
-----END PGP SIGNATURE-----
Information forwarded to debian-bugs-dist@lists.debian.org, Bdale Garbee <bdale@gag.com>
:
Bug#439335
; Package tar
.
(full text, mbox, link).
Acknowledgement sent to Sylvain Beucler <beuc@gnu.org>
:
Extra info received and forwarded to list. Copy sent to Bdale Garbee <bdale@gag.com>
.
(full text, mbox, link).
Message #43 received at 439335@bugs.debian.org (full text, mbox, reply):
Hi,
Was this forwarded to the Stable security team?
If I'm given a tarball that can replace /etc/passwd, I'd say this is
grave bug.
Thanks,
--
Sylvain
Information forwarded to debian-bugs-dist@lists.debian.org, Bdale Garbee <bdale@gag.com>
:
Bug#439335
; Package tar
.
(full text, mbox, link).
Acknowledgement sent to Nico Golde <nion@debian.org>
:
Extra info received and forwarded to list. Copy sent to Bdale Garbee <bdale@gag.com>
.
(full text, mbox, link).
Message #48 received at 439335@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Hi,
* Sylvain Beucler <beuc@gnu.org> [2007-09-09 13:56]:
> Was this forwarded to the Stable security team?
>
> If I'm given a tarball that can replace /etc/passwd, I'd say this is
> grave bug.
This bug is monitored via the security tracker:
http://security-tracker.debian.net/tracker/CVE-2007-4131
So they should be aware of it.
Kind regards
Nico
--
Nico Golde - http://ngolde.de - nion@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
[Message part 2 (application/pgp-signature, inline)]
Information forwarded to debian-bugs-dist@lists.debian.org, Bdale Garbee <bdale@gag.com>
:
Bug#439335
; Package tar
.
(full text, mbox, link).
Acknowledgement sent to paddy@panici.net
:
Extra info received and forwarded to list. Copy sent to Bdale Garbee <bdale@gag.com>
.
(full text, mbox, link).
Message #53 received at 439335@bugs.debian.org (full text, mbox, reply):
previously ...
Nico Golde <nion@debian.org> [Sun, 9 Sep 2007 14:30:06 +0200]:
> Hi,
> * Sylvain Beucler <beuc@gnu.org> [2007-09-09 13:56]:
> > Was this forwarded to the Stable security team?
> >
> > If I'm given a tarball that can replace /etc/passwd, I'd say this is
> > grave bug.
>
> This bug is monitored via the security tracker:
> http://security-tracker.debian.net/tracker/CVE-2007-4131
> So they should be aware of it.
just noticed this going past in an osx update and had a "what ever
happenned to that?" moment.
Regards,
Paddy
Reply sent to Florian Weimer <fw@deneb.enyo.de>
:
You have taken responsibility.
(full text, mbox, link).
Notification sent to Luca Bruno <luca.br@uno.it>
:
Bug acknowledged by developer.
(full text, mbox, link).
Message #58 received at 439335-close@bugs.debian.org (full text, mbox, reply):
Source: tar
Source-Version: 1.14-2.4
We believe that the bug you reported is fixed in the latest version of
tar, which is due to be installed in the Debian FTP archive:
tar_1.14-2.4.diff.gz
to pool/main/t/tar/tar_1.14-2.4.diff.gz
tar_1.14-2.4.dsc
to pool/main/t/tar/tar_1.14-2.4.dsc
tar_1.14-2.4_i386.deb
to pool/main/t/tar/tar_1.14-2.4_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 439335@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Florian Weimer <fw@deneb.enyo.de> (supplier of updated tar package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Wed, 26 Dec 2007 12:19:01 +0100
Source: tar
Binary: tar
Architecture: source i386
Version: 1.14-2.4
Distribution: oldstable-security
Urgency: high
Maintainer: Bdale Garbee <bdale@gag.com>
Changed-By: Florian Weimer <fw@deneb.enyo.de>
Description:
tar - GNU tar
Closes: 439335 441444
Changes:
tar (1.14-2.4) oldstable-security; urgency=high
.
* Non-maintainer upload by the security team
* Apply patch from Dmitry V. Levin <ldv@owl.openwall.com> to avoid a
stack-based buffer overflow while processing certain file names
(CVE-2007-4476). Closes: #441444.
* Apply patch from Dmitry V. Levin to fix double-dot recognition
in case of duplicate / (CVE-2007-4131). Closes: #439335.
Files:
cbcbbd7c638de842f913ac566c3f0b0a 846 base required tar_1.14-2.4.dsc
2675ec9acdf59ba6f0c54e5325675fcf 51869 base required tar_1.14-2.4.diff.gz
3b1099df9c1df15768f8dc568068e02f 500822 base required tar_1.14-2.4_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iQEVAwUBR3JTEL97/wQC1SS+AQIP4gf/SUnWTVcWn8qa8QXhlEfjct3ph4cOQRP7
/G6E9JDL7UaGavsR6O8JsBoSyl6cpwA4YCX54vZ9VA1P1NB2O/nkNFCG+rOX4zxl
WF2xl0Bj8ScPR5aSXC7KXgvhEVmF8NYzqRsfkW0NHGUNVH2BUGb1A/t2TEExPeB+
F9QXr9RoiNxwEEPcb5y46gRWZAgbbQBgdQeLUCQda9N4k1hqS1waEHuDbVA4F0bj
JUOV9rRS2Zm0lAmrUT9BwPYcQ2QjG1jhCunAl3pgERnc4ohDJ2ZrrSqmzLClVT7W
QJLL2YIOpFlIHbhNwX+jDNbQEPKirr3doO8z7im80bBf/z633H2/2A==
=7BMw
-----END PGP SIGNATURE-----
Reply sent to Florian Weimer <fw@deneb.enyo.de>
:
You have taken responsibility.
(full text, mbox, link).
Notification sent to Luca Bruno <luca.br@uno.it>
:
Bug acknowledged by developer.
(full text, mbox, link).
Message #63 received at 439335-close@bugs.debian.org (full text, mbox, reply):
Source: tar
Source-Version: 1.16-2etch4
We believe that the bug you reported is fixed in the latest version of
tar, which is due to be installed in the Debian FTP archive:
tar_1.16-2etch4.diff.gz
to pool/main/t/tar/tar_1.16-2etch4.diff.gz
tar_1.16-2etch4.dsc
to pool/main/t/tar/tar_1.16-2etch4.dsc
tar_1.16-2etch4_amd64.deb
to pool/main/t/tar/tar_1.16-2etch4_amd64.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 439335@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Florian Weimer <fw@deneb.enyo.de> (supplier of updated tar package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Wed, 26 Dec 2007 13:30:08 +0100
Source: tar
Binary: tar
Architecture: source amd64
Version: 1.16-2etch4
Distribution: stable-security
Urgency: high
Maintainer: Bdale Garbee <bdale@gag.com>
Changed-By: Florian Weimer <fw@deneb.enyo.de>
Description:
tar - GNU tar
Closes: 439335 441444
Changes:
tar (1.16-2etch4) stable-security; urgency=high
.
* Non-maintainer upload by the security team
* Apply patch from Dmitry V. Levin <ldv@owl.openwall.com> to avoid a
stack-based buffer overflow while processing certain file names
(CVE-2007-4476). Closes: #441444.
* Apply patch from Dmitry V. Levin to fix double-dot recognition
in case of duplicate / (CVE-2007-4131). Closes: #439335.
* Update the autoconf scripts to the etch version (no functional
changes, hopefully).
Files:
c7d9d75758a04174348cd65bb7aaab16 871 utils required tar_1.16-2etch4.dsc
d971b9d6114ad0527ef89fab0d3167e0 2199571 utils required tar_1.16.orig.tar.gz
96eb9bcd2d8257893a4f530eb00c9da5 31360 utils required tar_1.16-2etch4.diff.gz
b7287060cfefae808c694a60f9cb421c 714108 utils required tar_1.16-2etch4_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iQEVAwUBR3KRfL97/wQC1SS+AQKnRgf+JPmUC5MqJLya8dlKBP4lJSd6UDivOyJF
3ojUEQ/hJB3+rC32GoaNw84MkOms12Ceoo4fBGVrmlSpsGUeIgjL2qy/c59jKOay
fCcEkqnR2LHmW7DttOT+P1VuUHtwAlOelIs02R58VgwEIFY3EWg4GqaTtYFN+IkV
0BSWyovPlcbTsrtuHUTDn/5MAcJgmi/QjnZTlBWMfwaIdAJNmsLQlqc24/qtTeZ/
FKuk2mPkVtewMJTXUjrFB8BWe/edzn+u/yo11zerAahv+vAhSBOnpH5r/p/RBP9t
aGOi7Ard2y5fh+JjAM+TOud/JbmaGBBLH/lUJnKNpexrDKotW626xw==
=7bmw
-----END PGP SIGNATURE-----
Reply sent to Florian Weimer <fw@deneb.enyo.de>
:
You have taken responsibility.
(full text, mbox, link).
Notification sent to Luca Bruno <luca.br@uno.it>
:
Bug acknowledged by developer.
(full text, mbox, link).
Message #68 received at 439335-close@bugs.debian.org (full text, mbox, reply):
Source: tar
Source-Version: 1.16-2etch4
We believe that the bug you reported is fixed in the latest version of
tar, which is due to be installed in the Debian FTP archive:
tar_1.16-2etch4.diff.gz
to pool/main/t/tar/tar_1.16-2etch4.diff.gz
tar_1.16-2etch4.dsc
to pool/main/t/tar/tar_1.16-2etch4.dsc
tar_1.16-2etch4_amd64.deb
to pool/main/t/tar/tar_1.16-2etch4_amd64.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 439335@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Florian Weimer <fw@deneb.enyo.de> (supplier of updated tar package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Wed, 26 Dec 2007 13:30:08 +0100
Source: tar
Binary: tar
Architecture: source amd64
Version: 1.16-2etch4
Distribution: stable-security
Urgency: high
Maintainer: Bdale Garbee <bdale@gag.com>
Changed-By: Florian Weimer <fw@deneb.enyo.de>
Description:
tar - GNU tar
Closes: 439335 441444
Changes:
tar (1.16-2etch4) stable-security; urgency=high
.
* Non-maintainer upload by the security team
* Apply patch from Dmitry V. Levin <ldv@owl.openwall.com> to avoid a
stack-based buffer overflow while processing certain file names
(CVE-2007-4476). Closes: #441444.
* Apply patch from Dmitry V. Levin to fix double-dot recognition
in case of duplicate / (CVE-2007-4131). Closes: #439335.
* Update the autoconf scripts to the etch version (no functional
changes, hopefully).
Files:
c7d9d75758a04174348cd65bb7aaab16 871 utils required tar_1.16-2etch4.dsc
d971b9d6114ad0527ef89fab0d3167e0 2199571 utils required tar_1.16.orig.tar.gz
96eb9bcd2d8257893a4f530eb00c9da5 31360 utils required tar_1.16-2etch4.diff.gz
b7287060cfefae808c694a60f9cb421c 714108 utils required tar_1.16-2etch4_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iQEVAwUBR3KRfL97/wQC1SS+AQKnRgf+JPmUC5MqJLya8dlKBP4lJSd6UDivOyJF
3ojUEQ/hJB3+rC32GoaNw84MkOms12Ceoo4fBGVrmlSpsGUeIgjL2qy/c59jKOay
fCcEkqnR2LHmW7DttOT+P1VuUHtwAlOelIs02R58VgwEIFY3EWg4GqaTtYFN+IkV
0BSWyovPlcbTsrtuHUTDn/5MAcJgmi/QjnZTlBWMfwaIdAJNmsLQlqc24/qtTeZ/
FKuk2mPkVtewMJTXUjrFB8BWe/edzn+u/yo11zerAahv+vAhSBOnpH5r/p/RBP9t
aGOi7Ard2y5fh+JjAM+TOud/JbmaGBBLH/lUJnKNpexrDKotW626xw==
=7bmw
-----END PGP SIGNATURE-----
Reply sent to Florian Weimer <fw@deneb.enyo.de>
:
You have taken responsibility.
(full text, mbox, link).
Notification sent to Luca Bruno <luca.br@uno.it>
:
Bug acknowledged by developer.
(full text, mbox, link).
Message #73 received at 439335-close@bugs.debian.org (full text, mbox, reply):
Source: tar
Source-Version: 1.14-2.4
We believe that the bug you reported is fixed in the latest version of
tar, which is due to be installed in the Debian FTP archive:
tar_1.14-2.4.diff.gz
to pool/main/t/tar/tar_1.14-2.4.diff.gz
tar_1.14-2.4.dsc
to pool/main/t/tar/tar_1.14-2.4.dsc
tar_1.14-2.4_i386.deb
to pool/main/t/tar/tar_1.14-2.4_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 439335@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Florian Weimer <fw@deneb.enyo.de> (supplier of updated tar package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Wed, 26 Dec 2007 12:19:01 +0100
Source: tar
Binary: tar
Architecture: source i386
Version: 1.14-2.4
Distribution: oldstable-security
Urgency: high
Maintainer: Bdale Garbee <bdale@gag.com>
Changed-By: Florian Weimer <fw@deneb.enyo.de>
Description:
tar - GNU tar
Closes: 439335 441444
Changes:
tar (1.14-2.4) oldstable-security; urgency=high
.
* Non-maintainer upload by the security team
* Apply patch from Dmitry V. Levin <ldv@owl.openwall.com> to avoid a
stack-based buffer overflow while processing certain file names
(CVE-2007-4476). Closes: #441444.
* Apply patch from Dmitry V. Levin to fix double-dot recognition
in case of duplicate / (CVE-2007-4131). Closes: #439335.
Files:
cbcbbd7c638de842f913ac566c3f0b0a 846 base required tar_1.14-2.4.dsc
2675ec9acdf59ba6f0c54e5325675fcf 51869 base required tar_1.14-2.4.diff.gz
3b1099df9c1df15768f8dc568068e02f 500822 base required tar_1.14-2.4_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iQEVAwUBR3JTEL97/wQC1SS+AQIP4gf/SUnWTVcWn8qa8QXhlEfjct3ph4cOQRP7
/G6E9JDL7UaGavsR6O8JsBoSyl6cpwA4YCX54vZ9VA1P1NB2O/nkNFCG+rOX4zxl
WF2xl0Bj8ScPR5aSXC7KXgvhEVmF8NYzqRsfkW0NHGUNVH2BUGb1A/t2TEExPeB+
F9QXr9RoiNxwEEPcb5y46gRWZAgbbQBgdQeLUCQda9N4k1hqS1waEHuDbVA4F0bj
JUOV9rRS2Zm0lAmrUT9BwPYcQ2QjG1jhCunAl3pgERnc4ohDJ2ZrrSqmzLClVT7W
QJLL2YIOpFlIHbhNwX+jDNbQEPKirr3doO8z7im80bBf/z633H2/2A==
=7BMw
-----END PGP SIGNATURE-----
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org
.
(Tue, 22 Jul 2008 07:31:30 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Wed Jun 19 17:41:05 2019;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.