[Pkg-clamav-devel] Bug#1031513: marked as done (clamav: new upstream security release, CVE-2023-20032)

Debian Bug Tracking System owner at bugs.debian.org
Tue Feb 21 19:45:11 GMT 2023


Your message dated Tue, 21 Feb 2023 20:40:48 +0100
with message-id <20230221194048.GC28145 at inutil.org>
and subject line Re: [Pkg-clamav-devel] Bug#1031509: ETA on Patch for Buster
has caused the Debian Bug report #1031509,
regarding clamav: new upstream security release, CVE-2023-20032
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner at bugs.debian.org
immediately.)


-- 
1031509: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031509
Debian Bug Tracking System
Contact owner at bugs.debian.org with problems
-------------- next part --------------
An embedded message was scrubbed...
From: Joost van =?utf-8?Q?Baal-Ili=C4=87?= <joostvb+debian-bugs at uvt.nl>
Subject: clamav: new upstream security release, CVE-2023-20032
Date: Fri, 17 Feb 2023 16:32:12 +0100
Size: 5348
URL: <http://alioth-lists.debian.net/pipermail/pkg-clamav-devel/attachments/20230221/f30dac30/attachment-0002.eml>
-------------- next part --------------
An embedded message was scrubbed...
From: Moritz Muehlenhoff <jmm at inutil.org>
Subject: Re: [Pkg-clamav-devel] Bug#1031509: ETA on Patch for Buster
Date: Tue, 21 Feb 2023 20:40:48 +0100
Size: 2451
URL: <http://alioth-lists.debian.net/pipermail/pkg-clamav-devel/attachments/20230221/f30dac30/attachment-0003.eml>


More information about the Pkg-clamav-devel mailing list