[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#919529: marked as done (CVE-2019-6256)



Your message dated Thu, 17 Jan 2019 00:01:38 +0100
with message-id <20190116230138.GB12486@ramacher.at>
and subject line Re: Bug#919529: CVE-2019-6256
has caused the Debian Bug report #919529,
regarding CVE-2019-6256
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
919529: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=919529
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Source: liblivemedia
Severity: grave
Tags: security

Please see http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6256

Cheers,
        Moritz

--- End Message ---
--- Begin Message ---
Version: 2018.11.26-1

On 2019-01-17 00:00:13, Sebastian Ramacher wrote:
> Control: found -1 2016.11.28-1
> 
> On 2019-01-16 23:19:45, Moritz Muehlenhoff wrote:
> > Source: liblivemedia
> > Severity: grave
> > Tags: security
> > 
> > Please see http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6256
> > 
> > Cheers,
> >         Moritz
> 
> Not sure if I'm missing something, but the PoC does not seem to work on
> buster/sid. On stretch I get segfaults, but only if I abort the PoC. So marking
> as found in stable and closing for sid.

The actual mail to close the bug for sid.
-- 
Sebastian Ramacher

Attachment: signature.asc
Description: PGP signature


--- End Message ---

Reply to: