Bug#520039: marked as done (libsoup: CVE-2009-0585 integer overflow vulnerability)

Debian Bug Tracking System owner at bugs.debian.org
Tue Mar 17 12:21:04 UTC 2009


Your message dated Tue, 17 Mar 2009 13:20:19 +0100
with message-id <1237292419.5547.8.camel at odin.lan>
and subject line Re: Bug#520039: libsoup: CVE-2009-0585 integer overflow vulnerability
has caused the Debian Bug report #520039,
regarding libsoup: CVE-2009-0585 integer overflow vulnerability
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner at bugs.debian.org
immediately.)


-- 
520039: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=520039
Debian Bug Tracking System
Contact owner at bugs.debian.org with problems
-------------- next part --------------
An embedded message was scrubbed...
From: Michael Gilbert <michael.s.gilbert at gmail.com>
Subject: libsoup: CVE-2009-0585 integer overflow vulnerability
Date: Mon, 16 Mar 2009 19:56:40 -0400
Size: 3490
Url: http://lists.alioth.debian.org/pipermail/pkg-gnome-maintainers/attachments/20090317/6f8d42ab/attachment.eml 
-------------- next part --------------
An embedded message was scrubbed...
From: Sebastian =?ISO-8859-1?Q?Dr=F6ge?= <slomo at circular-chaos.org>
Subject: Re: Bug#520039: libsoup: CVE-2009-0585 integer overflow
 vulnerability
Date: Tue, 17 Mar 2009 13:20:19 +0100
Size: 3460
Url: http://lists.alioth.debian.org/pipermail/pkg-gnome-maintainers/attachments/20090317/6f8d42ab/attachment-0001.eml 


More information about the pkg-gnome-maintainers mailing list