Bug#807614: marked as done (grub2: CVE-2015-8370: buffer overflow when checking password entered during bootup)
Debian Bug Tracking System
owner at bugs.debian.org
Wed Dec 16 10:42:39 UTC 2015
Your message dated Wed, 16 Dec 2015 10:39:53 +0000
with message-id <E1a99Uv-0003PS-Fi at franck.debian.org>
and subject line Bug#808122: fixed in grub2 2.02~beta2-33
has caused the Debian Bug report #808122,
regarding grub2: CVE-2015-8370: buffer overflow when checking password entered during bootup
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner at bugs.debian.org
immediately.)
--
808122: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808122
Debian Bug Tracking System
Contact owner at bugs.debian.org with problems
-------------- next part --------------
An embedded message was scrubbed...
From: Salvatore Bonaccorso <carnil at debian.org>
Subject: grub2: CVE-2015-8370: buffer overflow when checking password entered during bootup
Date: Thu, 10 Dec 2015 22:43:41 +0100
Size: 2180
URL: <http://lists.alioth.debian.org/pipermail/pkg-grub-devel/attachments/20151216/6d59b972/attachment.mht>
-------------- next part --------------
An embedded message was scrubbed...
From: Colin Watson <cjwatson at debian.org>
Subject: Bug#808122: fixed in grub2 2.02~beta2-33
Date: Wed, 16 Dec 2015 10:39:53 +0000
Size: 9271
URL: <http://lists.alioth.debian.org/pipermail/pkg-grub-devel/attachments/20151216/6d59b972/attachment-0001.mht>
More information about the Pkg-grub-devel
mailing list