Your message dated Sun, 30 Mar 2014 17:59:33 +0300
with message-id <20140330145933.ga12...@kludge.henri.nerv.fi>
and subject line closing
has caused the Debian Bug report #688331,
regarding boost1.42: CVE-2012-2677
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
688331: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688331
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: boost1.42
Severity: grave
Tags: security patch
Justification: user security hole

This is done in unstable, but not in stable up to now so:

Please see 
http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/

The upstream fix and a test case is available here:
https://svn.boost.org/trac/boost/changeset/78326

(Copied from #677197)

cu

AW

-- System Information:
Debian Release: 6.0.5
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable'), (50, 'proposed-updates')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-5-686 (SMP w/2 CPU cores)
Locale: LANG=C, LC_CTYPE=de_DE (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/dash

--- End Message ---
--- Begin Message ---
Closing as wontfix. Please reopen if needed. For more information please see
https://security-tracker.debian.org/tracker/CVE-2012-2677

---
Henri Salo

Attachment: signature.asc
Description: Digital signature


--- End Message ---

Reply via email to