Your message dated Tue, 30 May 2006 21:42:47 +0200
with message-id <[EMAIL PROTECTED]>
and subject line CAN-2005-0605: buffer overflow
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: lesstif1
Version: 1:0.93.18-5
Severity: grave, woody
Tags: security
Justification: user security hole

I am not sure if lesstif1 is affected of CAN-2005-0605. If it is not,
then please add an entry to 

http://www.debian.org/security/nonvulns-woody

-- System Information
Debian Release: 3.0
Architecture: i386
Kernel: Linux pleione 2.4.26-grsec #1 Tue Aug 10 15:42:40 CEST 2004 i686
Locale: LANG=en_US, LC_CTYPE=en_US

Versions of packages lesstif1 depends on:
ii  libc6                         2.2.5-11.8 GNU C Library: Shared libraries an



--- End Message ---
--- Begin Message ---
On Sat, Mar 19, 2005 at 05:41:12PM +0100, Helge Kreutzmann wrote:
> Package: lesstif1
> Version: 1:0.93.18-5
> Severity: grave, woody
> Tags: security
> Justification: user security hole
> 
> I am not sure if lesstif1 is affected of CAN-2005-0605. If it is not,
> then please add an entry to 
> 
> http://www.debian.org/security/nonvulns-woody


  this CAN is related to libXPM. this bug report is INVALID.
-- 
·O·  Pierre Habouzit
··O                                                [EMAIL PROTECTED]
OOO                                                http://www.madism.org

Attachment: signature.asc
Description: Digital signature


--- End Message ---

Reply via email to