Your message dated Sat, 3 Mar 2012 13:44:15 +0000
with message-id <[email protected]>
and subject line Re: Bug#657217: bip: buffer overflow (CVE-2012-0806)
has caused the Debian Bug report #657217,
regarding bip: buffer overflow (CVE-2012-0806)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
657217: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657217
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: bip
Severity: grave
Tags: security patch

The following vulnerability had been reported against bip: 
https://projects.duckcorp.org/issues/269

The patch can be found here: 
https://projects.duckcorp.org/projects/bip/repository/revisions/222a33cb84a2e52ad55a88900b7895bf9dd0262c

This bug is present in 0.8.8 and previous versions and, according to reporter, 
remote execution of code should be possible.

Please use CVE-2012-0806 for this issue.

/luciano



--- End Message ---
--- Begin Message ---
Version: 0.8.2-1squeeze4

I wrote:
> On Tue, 24 Jan 2012 at 22:45:42 +0100, Luciano Bello wrote:
> > Please use CVE-2012-0806 for this issue.
>
> The maintainer appears to have fixed this in 0.8.8-2 before this bug
> was opened, so I'm closing the bug with version-tracking.

Likewise, but for stable-security.

Thanks,
    S


--- End Message ---

Reply via email to