Bug#606612: marked as done (exim4: Exploitable memory corruption vulnerability (CVE-2010-4344))

Debian Bug Tracking System owner at bugs.debian.org
Fri Dec 10 15:33:15 UTC 2010


Your message dated Fri, 10 Dec 2010 16:31:11 +0100
with message-id <20101210153111.GI2287 at patate.is-a-geek.org>
and subject line Re: Bug#606612: exim4: Exploitable memory corruption vulnerability
has caused the Debian Bug report #606612,
regarding exim4: Exploitable memory corruption vulnerability (CVE-2010-4344)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner at bugs.debian.org
immediately.)


-- 
606612: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606612
Debian Bug Tracking System
Contact owner at bugs.debian.org with problems
-------------- next part --------------
An embedded message was scrubbed...
From: Dominic Hargreaves <dom at earth.li>
Subject: exim4: Exploitable memory corruption vulnerability
Date: Fri, 10 Dec 2010 11:01:09 +0000
Size: 2406
URL: <http://lists.alioth.debian.org/pipermail/pkg-exim4-maintainers/attachments/20101210/5bf39a65/attachment-0002.eml>
-------------- next part --------------
An embedded message was scrubbed...
From: Julien Cristau <jcristau at debian.org>
Subject: Re: Bug#606612: exim4: Exploitable memory corruption vulnerability
Date: Fri, 10 Dec 2010 16:31:11 +0100
Size: 3608
URL: <http://lists.alioth.debian.org/pipermail/pkg-exim4-maintainers/attachments/20101210/5bf39a65/attachment-0003.eml>


More information about the Pkg-exim4-maintainers mailing list