Hi Ricardo,
Sun, 6 Mar 2005 13:35:15 +0100, Ricardo Mones
Re: Bug#298173: sylpheed: [security] buffer overflow (= 1.0.2), now 1.0.3
is released
There was no security bug at the time I made the packages (see their
dates), that's the reason there are no references to this bug there.
Ah, OK
On Sun, 06 Mar 2005 11:09:30 +0900
Hideki Yamane [EMAIL PROTECTED] wrote:
Sat, 05 Mar 2005 17:35:02 +0100, Ricardo Mones
Re: Bug#298173: sylpheed: [security] buffer overflow (= 1.0.2), now
1.0.3 is released
Thanks for reminding but I've already done it, just waiting for my
sponsor
Package: sylpheed
Severity: critical
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Dear sylpeed maintainer,
A buffer overflow bug was found and fixed at 1.0.3.
This problem exists in almost all of the older version, so it affects
woody, sarge and sid. Please update sylpheed package.
See
Processing commands for [EMAIL PROTECTED]:
tags 298173 pending
Bug#298173: sylpheed: [security] buffer overflow (= 1.0.2), now 1.0.3 is
released
Tags were: woody sid sarge security
Tags added: pending
thanks
Stopping processing here.
Please contact me if you need assistance.
Debian bug
tags 298173 pending
thanks
Dear sylpheed user,
On Sat, 05 Mar 2005 20:24:04 +0900
Hideki Yamane [EMAIL PROTECTED] wrote:
Package: sylpheed
Severity: critical
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Dear sylpeed maintainer,
A buffer overflow bug was found and fixed at 1.0.3.
Hi,
Sat, 05 Mar 2005 17:35:02 +0100, Ricardo Mones
Re: Bug#298173: sylpheed: [security] buffer overflow (= 1.0.2), now 1.0.3
is released
Thanks for reminding but I've already done it, just waiting for my
sponsor to upload the packages.
See http://sylpheed.mine.nu:9981/debian if you need
6 matches
Mail list logo