Your message dated Wed, 11 Aug 2010 17:36:21 +0200
with message-id <4c62c375.6030...@thykier.net>
and subject line Fixed in 6-20-0lenny1
has caused the Debian Bug report #521414,
regarding Buffer Overflow Vulnerabilities
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
521414: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521414
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: sun-java6-jre
Version: 6-12-1
Severity: critical
Tags: security
There are critical security vulnerabilities in the java runtime
environment by sun. See the following pages for details:
http://sunsolve.sun.com/search/document.do?assetkey=1-66-254570-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-254571-1
Heute schon ge"freeMail"t?
Jetzt kostenlose E-Mail-Adresse
sichern!
http://email.freenet.de/dienste/emailoffice/produktuebersicht/basic/mail/index.html?pid=6831
--- End Message ---
--- Begin Message ---
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Version: 6-20-0lenny1
Hi
This was fixed in the 6-20-0lenny1 upload, but the changelog failed to
mention that this bug was fixed.
~Niels
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iEYEAREIAAYFAkxiw3MACgkQVCqoiq1YlqxrBACeK/bUl9K7OA/OV4A+FrIybFyv
HX0AoLPOJWgTLOW5VO4CfgSaDUL/i2dn
=XPms
-----END PGP SIGNATURE-----
--- End Message ---