Your message dated Fri, 10 Mar 2006 07:51:25 +0100
with message-id <[EMAIL PROTECTED]>
and subject line flashplugin-nonfree: Version 7,0,61,0 released to fix 
CVE-2005-2628
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: flashplugin-nonfree
Version: 7.0.25-5
Severity: grave
Tags: security
Justification: user security hole


Macromedia has released version 7,0,61,0 to fix CVE-2005-2628 (buffer
overflow).


-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12-1-686
Locale: LANG=en_US.UTF-8, LC_CTYPE=sv_SE.UTF-8 (charmap=UTF-8)

Versions of packages flashplugin-nonfree depends on:
ii  debconf                       1.4.59     Debian configuration management sy
ii  libruby                       1.8.2-1    Libraries necessary to run Ruby 1.
ii  ruby                          1.8.2-1    An interpreter of object-oriented 

Versions of packages flashplugin-nonfree recommends:
pn  gsfonts-x11                   <none>     (no description available)
pn  libstdc++2.10-glibc2.2        <none>     (no description available)

-- debconf information excluded


--- End Message ---
--- Begin Message ---
The previous maintainer fixed CVE-2005-2628 in 7.0.61-1 on 29 Nov
2005.  Closing this bug without further action.  Feel free to reopen and
explain why.

--- End Message ---

Reply via email to