[Pkg-openssl-devel] Bug#675436: marked as done (openssl: Buffer overflow vulnerability)
Debian Bug Tracking System
owner at bugs.debian.org
Sun Mar 20 08:45:11 UTC 2016
Your message dated Sun, 20 Mar 2016 10:44:09 +0200
with message-id <20160320084409.GA10111 at tunkki>
and subject line closing
has caused the Debian Bug report #675436,
regarding openssl: Buffer overflow vulnerability
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner at bugs.debian.org
immediately.)
--
675436: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=675436
Debian Bug Tracking System
Contact owner at bugs.debian.org with problems
-------------- next part --------------
An embedded message was scrubbed...
From: Henri Salo <henri at nerv.fi>
Subject: openssl: Buffer overflow vulnerability
Date: Fri, 1 Jun 2012 10:18:25 +0300
Size: 3430
URL: <http://lists.alioth.debian.org/pipermail/pkg-openssl-devel/attachments/20160320/972543a7/attachment.mht>
-------------- next part --------------
An embedded message was scrubbed...
From: Henri Salo <henri at nerv.fi>
Subject: closing
Date: Sun, 20 Mar 2016 10:44:09 +0200
Size: 2193
URL: <http://lists.alioth.debian.org/pipermail/pkg-openssl-devel/attachments/20160320/972543a7/attachment-0001.mht>
More information about the Pkg-openssl-devel
mailing list