oss-sec mailing list archives
Bug#771125: Info received ([oss-security] CVE request: mutt: heap-based buffer overflow in mutt_substrdup())
From: owner () bugs debian org (Debian Bug Tracking System)
Date: Thu, 27 Nov 2014 04:15:10 +0000
Thank you for the additional information you have supplied regarding this Bug report. This is an automatically generated reply to let you know your message has been received. Your message is being forwarded to the package maintainers and other interested parties for their attention; they will reply in due course. Your message has been sent to the package maintainer(s): Antonio Radici <antonio () dyne org> If you wish to submit further information on this problem, please send it to 771125 () bugs debian org. Please do not send mail to owner () bugs debian org unless you wish to report a problem with the Bug-tracking system. -- 771125: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771125 Debian Bug Tracking System Contact owner () bugs debian org with problems
Current thread:
- CVE request: mutt: heap-based buffer overflow in mutt_substrdup() Murray McAllister (Nov 26)
- Re: CVE request: mutt: heap-based buffer overflow in mutt_substrdup() Murray McAllister (Nov 26)
- Bug#771125: Info received ([oss-security] CVE request: mutt: heap-based buffer overflow in mutt_substrdup()) Debian Bug Tracking System (Nov 27)
- Re: CVE request: mutt: heap-based buffer overflow in mutt_substrdup() Murray McAllister (Nov 26)
- Re: CVE request: mutt: heap-based buffer overflow in mutt_substrdup() cve-assign (Nov 26)
- Re: Bug#771125: CVE request: mutt: heap-based buffer overflow in mutt_substrdup() Antonio Radici (Nov 27)