Hi Aurelien, On Wed, Oct 28, 2015, at 14:30, Aurelien Jarno wrote: > On 2015-10-28 13:03, Debian Bug Tracking System wrote: > > Processing commands for [email protected]: > > > > > reopen 776391 > > Bug #776391 {Done: "Interfax" <[email protected]>} [eglibc] > > [CVE-2015-0235]: heap-based buffer overflow in __nss_hostname_digits_dots() > > 'reopen' may be inappropriate when a bug has been closed with a version; > > all fixed versions will be cleared, and you may need to re-add them. > > Bug reopened > > No longer marked as fixed in versions 2.11.3-4+deb6u4, 2.18-1, and > > 2.13-38+deb7u7. > > > thanks > > Stopping processing here. > > Could you please explain why you believe this bug is still present?
it was closed by spam and the last action was tagging it squeeze,wheezy? So perhaps I was just confused by the double closing, in that case, I appologize. Cheers, -- Ondřej Surý <[email protected]> Knot DNS (https://www.knot-dns.cz/) – a high-performance DNS server

