Bug#677717: "malicious escape sequences can cause denial of service for vte-based terminals"

Jonathan Wiltshire jmw at debian.org
Mon Jul 9 21:22:46 UTC 2012


On Mon, Jul 09, 2012 at 07:06:10PM +0200, Josselin Mouette wrote:
> Le dimanche 08 juillet 2012 à 17:38 +0000, Jonathan Wiltshire a écrit : 
> > Recently you fixed one or more security problems and as a result you closed
> > this bug. These problems were not serious enough for a Debian Security
> > Advisory, so they are now on my radar for fixing in the following suites
> > through point releases:
> > 
> > squeeze (6.0.6) - use target "stable"
> 
> This update has already been accepted in squeeze.

Thanks; for some reason it doesn't show up in the queue output, hence this
false positive. Tracker updated, sorry for the noise.


-- 
Jonathan Wiltshire                                      jmw at debian.org
Debian Developer                         http://people.debian.org/~jmw

4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51

<directhex> i have six years of solaris sysadmin experience, from
            8->10. i am well qualified to say it is made from bonghits
			layered on top of bonghits
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: Digital signature
URL: <http://lists.alioth.debian.org/pipermail/pkg-gnome-maintainers/attachments/20120709/d31a8dad/attachment-0001.pgp>


More information about the pkg-gnome-maintainers mailing list