[Pkg-e-devel] Bug#843434: marked as done (terminology: CVE-2015-8971: Escape Sequence Command Execution vulnerability)

Debian Bug Tracking System owner at bugs.debian.org
Thu Dec 15 18:21:15 UTC 2016


Your message dated Thu, 15 Dec 2016 18:19:36 +0000
with message-id <E1cHacy-0008Tb-NN at fasolo.debian.org>
and subject line Bug#843434: fixed in terminology 0.9.1-1
has caused the Debian Bug report #843434,
regarding terminology: CVE-2015-8971: Escape Sequence Command Execution vulnerability
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner at bugs.debian.org
immediately.)


-- 
843434: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=843434
Debian Bug Tracking System
Contact owner at bugs.debian.org with problems
-------------- next part --------------
An embedded message was scrubbed...
From: Salvatore Bonaccorso <carnil at debian.org>
Subject: terminology: Escape Sequence Command Execution vulnerability
Date: Sun, 06 Nov 2016 18:12:31 +0100
Size: 1959
URL: <http://lists.alioth.debian.org/pipermail/pkg-e-devel/attachments/20161215/0779789a/attachment.mht>
-------------- next part --------------
An embedded message was scrubbed...
From: Ross Vandegrift <ross at kallisti.us>
Subject: Bug#843434: fixed in terminology 0.9.1-1
Date: Thu, 15 Dec 2016 18:19:36 +0000
Size: 6182
URL: <http://lists.alioth.debian.org/pipermail/pkg-e-devel/attachments/20161215/0779789a/attachment-0001.mht>


More information about the Pkg-e-devel mailing list