Bug#677717: "malicious escape sequences can cause denial of service for vte-based terminals"
Jonathan Wiltshire
jmw at debian.org
Mon Jul 9 21:22:46 UTC 2012
On Mon, Jul 09, 2012 at 07:06:10PM +0200, Josselin Mouette wrote:
> Le dimanche 08 juillet 2012 à 17:38 +0000, Jonathan Wiltshire a écrit :
> > Recently you fixed one or more security problems and as a result you closed
> > this bug. These problems were not serious enough for a Debian Security
> > Advisory, so they are now on my radar for fixing in the following suites
> > through point releases:
> >
> > squeeze (6.0.6) - use target "stable"
>
> This update has already been accepted in squeeze.
Thanks; for some reason it doesn't show up in the queue output, hence this
false positive. Tracker updated, sorry for the noise.
--
Jonathan Wiltshire jmw at debian.org
Debian Developer http://people.debian.org/~jmw
4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3 5394 479D D352 4C51
<directhex> i have six years of solaris sysadmin experience, from
8->10. i am well qualified to say it is made from bonghits
layered on top of bonghits
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: Digital signature
URL: <http://lists.alioth.debian.org/pipermail/pkg-gnome-maintainers/attachments/20120709/d31a8dad/attachment-0001.pgp>
More information about the pkg-gnome-maintainers
mailing list