Your message dated Sun, 30 Aug 2009 01:54:47 +
with message-id e1mhzd1-0002td...@ries.debian.org
and subject line Bug#535909: fixed in camlimages 2.20-8+etch1
has caused the Debian Bug report #535909,
regarding camlimages: CVE-2009-2295 several integer overflows
to be marked as done
United Nations has awarded a prize donation of 950,500.00USD Email.Provide your
information to Dr Extrada E:mail: u_cashgra...@yahoo.com.hk
Tel:44:7011148748
Sincerely,
Dr Packer Extrada.
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe.
Your message dated Mon, 10 Aug 2009 19:57:57 +
with message-id e1mab0h-0006yv...@ries.debian.org
and subject line Bug#535909: fixed in camlimages 1:2.2.0-4+lenny1
has caused the Debian Bug report #535909,
regarding camlimages: CVE-2009-2295 several integer overflows
to be marked as done
Hello,
On Sat, Aug 08, 2009 at 11:01:45PM -0400, Michael S. Gilbert wrote:
reopen 535909
fixed 535909 1:3.0.1-3
thanks
This bug has been solved with 1:3.0.1-2 before the bug was opened.
thanks for the update. please coordinate with the security team to
prepare updates for the stable
On Sun, 9 Aug 2009 11:00:50 +0200 Sylvain Le Gall wrote:
Hello,
On Sat, Aug 08, 2009 at 11:01:45PM -0400, Michael S. Gilbert wrote:
reopen 535909
fixed 535909 1:3.0.1-3
thanks
This bug has been solved with 1:3.0.1-2 before the bug was opened.
thanks for the update. please
system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
535909: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535909
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
package: camlimages
version: 2.20-8
severity: serious
Processing commands for cont...@bugs.debian.org:
reopen 535909
Bug #535909 {Done: Sylvain Le Gall gil...@debian.org} [camlimages]
camlimages: CVE-2009-2295 several integer overflows
fixed 535909 1:3.0.1-3
Bug #535909 [camlimages] camlimages: CVE-2009-2295 several integer overflows
reopen 535909
fixed 535909 1:3.0.1-3
thanks
This bug has been solved with 1:3.0.1-2 before the bug was opened.
thanks for the update. please coordinate with the security team to
prepare updates for the stable releases.
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
On Sun, Jul 05, 2009 at 07:38:51PM -0400, Michael S. Gilbert wrote:
package: camlimages
version: 2.20-8
severity: serious
tags: security
hello,
camlimages is vulnerable to several integer overflows [1]. this has
not yet been fixed upstream, but has been addressed by redhat [2].
Hello,
On Sun, Jul 05, 2009 at 07:38:51PM -0400, Michael S. Gilbert wrote:
package: camlimages
version: 2.20-8
severity: serious
tags: security
hello,
camlimages is vulnerable to several integer overflows [1]. this has
not yet been fixed upstream, but has been addressed by redhat [2].
On Mon, Jul 06, 2009 at 09:40:48AM +0200, Sylvain Le Gall wrote:
Patch has already been applied for sid version (3.0.1-2), migration to
lenny is blocked by current OCaml 3.11.1 transition.
^
Errata corrige. Migration to *squeeze* (i.e., testing) is currently
blocked by the transition.
package: camlimages
version: 2.20-8
severity: serious
tags: security
hello,
camlimages is vulnerable to several integer overflows [1]. this has
not yet been fixed upstream, but has been addressed by redhat [2].
[1] http://www.ocert.org/advisories/ocert-2009-009.html
[2]
12 matches
Mail list logo