Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <handler.771125.B771125.141706147830602.ackinfo@bugs.debian.org>
Date: Thu, 27 Nov 2014 04:15:10 +0000
From: owner@...s.debian.org (Debian Bug Tracking System)
To: oss-security@...ts.openwall.com
Subject: Bug#771125: Info received (CVE request: mutt:
 heap-based buffer overflow in mutt_substrdup())

Thank you for the additional information you have supplied regarding
this Bug report.

This is an automatically generated reply to let you know your message
has been received.

Your message is being forwarded to the package maintainers and other
interested parties for their attention; they will reply in due course.

Your message has been sent to the package maintainer(s):
 Antonio Radici <antonio@...e.org>

If you wish to submit further information on this problem, please
send it to 771125@...s.debian.org.

Please do not send mail to owner@...s.debian.org unless you wish
to report a problem with the Bug-tracking system.

-- 
771125: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771125
Debian Bug Tracking System
Contact owner@...s.debian.org with problems

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.