|
Message-ID: <handler.771125.B771125.141706147830602.ackinfo@bugs.debian.org> Date: Thu, 27 Nov 2014 04:15:10 +0000 From: owner@...s.debian.org (Debian Bug Tracking System) To: oss-security@...ts.openwall.com Subject: Bug#771125: Info received (CVE request: mutt: heap-based buffer overflow in mutt_substrdup()) Thank you for the additional information you have supplied regarding this Bug report. This is an automatically generated reply to let you know your message has been received. Your message is being forwarded to the package maintainers and other interested parties for their attention; they will reply in due course. Your message has been sent to the package maintainer(s): Antonio Radici <antonio@...e.org> If you wish to submit further information on this problem, please send it to 771125@...s.debian.org. Please do not send mail to owner@...s.debian.org unless you wish to report a problem with the Bug-tracking system. -- 771125: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771125 Debian Bug Tracking System Contact owner@...s.debian.org with problems
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.