Your message dated Tue, 14 Aug 2007 22:54:40 +0200
with message-id <[EMAIL PROTECTED]>
and subject line file - CVE-2007-2799: incorrect patch for CVE-2007-1536
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: file
Version: 4.21-1
Severity: serious
Tags: security
| Integer overflow in the "file" program 4.20, when running on 32-bit
| systems, might allow user-assisted attackers to execute arbitrary code
| via a large file that triggers an overflow that bypasses an assert()
| statement. NOTE: this issue is due to an incorrect patch for
| CVE-2007-1536.
Bastian
--
Each kiss is as the first.
-- Miramanee, Kirk's wife, "The Paradise Syndrome",
stardate 4842.6
signature.asc
Description: Digital signature
--- End Message ---
--- Begin Message ---
This bug has been fixed everywhere, hence closing it.
--
Address: Daniel Baumann, Burgunderstrasse 3, CH-4562 Biberist
Email: [EMAIL PROTECTED]
Internet: http://people.panthera-systems.net/~daniel-baumann/
--- End Message ---