[email protected]
[Top] [All Lists]

Processed: t1lib security flaw: CVE-2007-4033/#439927

Subject: Processed: t1lib security flaw: CVE-2007-4033/#439927
From: Debian Bug Tracking System
Date: Sun, 16 Sep 2007 18:33:05 +0000
Processing commands for [email protected]:

> forwarded 439927 [email protected]
Bug#439927: CVE-2007-4033: Buffer overflow in GD extension
Noted your statement that Bug has been forwarded to [email protected]

> tag 439927 patch confirmed upstream
Bug#439927: CVE-2007-4033: Buffer overflow in GD extension
Tags were: security
Tags added: patch, confirmed, upstream

> severity 439927 serious
Bug#439927: CVE-2007-4033: Buffer overflow in GD extension
Severity set to `serious' from `normal'

> found 439927 5.1.0-2
Bug#439927: CVE-2007-4033: Buffer overflow in GD extension
Bug marked as found in version 5.1.0-2.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

<Prev in Thread] Current Thread [Next in Thread>
  • Processed: t1lib security flaw: CVE-2007-4033/#439927, Debian Bug Tracking System <=