Bug#573877: marked as done (gmime2.4: CVE-2010-0409: buffer overflow can lead to DoS or arbitrary code execution)

Debian Bug Tracking System owner at bugs.debian.org
Mon Apr 12 12:36:03 UTC 2010


Your message dated Mon, 12 Apr 2010 12:32:38 +0000
with message-id <E1O1Iog-0004hi-JQ at ries.debian.org>
and subject line Bug#573877: fixed in gmime2.4 2.4.14-1+nmu1
has caused the Debian Bug report #573877,
regarding gmime2.4: CVE-2010-0409: buffer overflow can lead to DoS or arbitrary code execution
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner at bugs.debian.org
immediately.)


-- 
573877: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=573877
Debian Bug Tracking System
Contact owner at bugs.debian.org with problems
-------------- next part --------------
An embedded message was scrubbed...
From: Emilio Pozuelo Monfort <pochu at debian.org>
Subject: gmime2.4: CVE-2010-0409: buffer overflow can lead to DoS or arbitrary code
 execution
Date: Sun, 14 Mar 2010 18:06:52 +0100
Size: 2284
URL: <http://lists.alioth.debian.org/pipermail/pkg-gnome-maintainers/attachments/20100412/d0ab338c/attachment.eml>
-------------- next part --------------
An embedded message was scrubbed...
From: Michael Gilbert <michael.s.gilbert at gmail.com>
Subject: Bug#573877: fixed in gmime2.4 2.4.14-1+nmu1
Date: Mon, 12 Apr 2010 12:32:38 +0000
Size: 6885
URL: <http://lists.alioth.debian.org/pipermail/pkg-gnome-maintainers/attachments/20100412/d0ab338c/attachment-0001.eml>


More information about the pkg-gnome-maintainers mailing list