Hi Aurelien,

On Wed, Oct 28, 2015, at 14:30, Aurelien Jarno wrote:
> On 2015-10-28 13:03, Debian Bug Tracking System wrote:
> > Processing commands for [email protected]:
> > 
> > > reopen 776391
> > Bug #776391 {Done: "Interfax" <[email protected]>} [eglibc] 
> > [CVE-2015-0235]: heap-based buffer overflow in __nss_hostname_digits_dots()
> > 'reopen' may be inappropriate when a bug has been closed with a version;
> > all fixed versions will be cleared, and you may need to re-add them.
> > Bug reopened
> > No longer marked as fixed in versions 2.11.3-4+deb6u4, 2.18-1, and 
> > 2.13-38+deb7u7.
> > > thanks
> > Stopping processing here.
> 
> Could you please explain why you believe this bug is still present?

it was closed by spam and the last action was tagging it squeeze,wheezy?
 So perhaps I was just confused by the double closing, in that case, I
appologize.

Cheers,
-- 
Ondřej Surý <[email protected]>
Knot DNS (https://www.knot-dns.cz/) – a high-performance DNS server

Reply via email to