Bug#527077: marked as done ([SA34927] libmodplug "PATinst()" Buffer Overflow Vulnerability)

Debian Bug Tracking System owner at bugs.debian.org
Wed May 6 08:12:13 UTC 2009


Your message dated Wed, 06 May 2009 10:07:57 +0200
with message-id <1241597277.18835.87.camel at odin.lan>
and subject line Re: Bug#527077: [SA34927] libmodplug "PATinst()" Buffer Overflow Vulnerability
has caused the Debian Bug report #527077,
regarding [SA34927] libmodplug "PATinst()" Buffer Overflow Vulnerability
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner at bugs.debian.org
immediately.)


-- 
527077: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=527077
Debian Bug Tracking System
Contact owner at bugs.debian.org with problems
-------------- next part --------------
An embedded message was scrubbed...
From: Giuseppe Iuculano <giuseppe at iuculano.it>
Subject: [SA34927] libmodplug "PATinst()" Buffer Overflow Vulnerability
Date: Wed, 29 Apr 2009 09:03:43 +0200
Size: 3019
URL: <http://lists.alioth.debian.org/pipermail/pkg-gstreamer-maintainers/attachments/20090506/13305386/attachment.eml>
-------------- next part --------------
An embedded message was scrubbed...
From: Sebastian =?ISO-8859-1?Q?Dr=F6ge?= <slomo at circular-chaos.org>
Subject: Re: Bug#527077: [SA34927] libmodplug "PATinst()" Buffer Overflow
 Vulnerability
Date: Wed, 06 May 2009 10:07:57 +0200
Size: 3206
URL: <http://lists.alioth.debian.org/pipermail/pkg-gstreamer-maintainers/attachments/20090506/13305386/attachment-0001.eml>


More information about the Pkg-gstreamer-maintainers mailing list