Your message dated Tue, 27 May 2014 22:47:09 +0000
with message-id <e1wpq9f-0000vj...@franck.debian.org>
and subject line Bug#746593: fixed in rxvt-unicode 9.15-2+deb7u1
has caused the Debian Bug report #746593,
regarding rxvt-unicode: CVE-2014-3121: user-assisted arbitrary commands 
execution
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
746593: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746593
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: rxvt-unicode
Severity: grave
Tags: security upstream fixed-upstream
Justification: user security hole

Hi,

the following vulnerability was published for rxvt-unicode.

CVE-2014-3121[0]:
user-assisted arbitrary commands execution

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3121
    https://security-tracker.debian.org/tracker/CVE-2014-3121

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: rxvt-unicode
Source-Version: 9.15-2+deb7u1

We believe that the bug you reported is fixed in the latest version of
rxvt-unicode, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 746...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ryan Kavanagh <r...@debian.org> (supplier of updated rxvt-unicode package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 07 May 2014 09:32:02 -0400
Source: rxvt-unicode
Binary: rxvt-unicode rxvt-unicode-ml rxvt-unicode-256color rxvt-unicode-lite
Architecture: source amd64
Version: 9.15-2+deb7u1
Distribution: wheezy-security
Urgency: high
Maintainer: Debian rxvt-unicode Maintainers 
<pkg-urxvt-maintain...@lists.alioth.debian.org>
Changed-By: Ryan Kavanagh <r...@debian.org>
Description: 
 rxvt-unicode - RXVT-like terminal emulator with Unicode support
 rxvt-unicode-256color - multi-lingual terminal emulator with Unicode support 
for X11
 rxvt-unicode-lite - RXVT-like terminal emulator with basic Unicode support
 rxvt-unicode-ml - multi-lingual terminal emulator -- transitional package
Closes: 746593
Changes: 
 rxvt-unicode (9.15-2+deb7u1) wheezy-security; urgency=high
 .
   * Fix user-assisted security vulnerability, 13_CVE-2014-3121.diff:
     This fixes a user-assisted arbitrary commands execution vulnerability that
     could be exploited using certain escape sequences in a crafted text file
     or program output (CVE-2014-3121) (Closes: #746593)
Checksums-Sha1: 
 e8f3128afa537dfcb3df46c1e587a86ecc8ff212 3439 rxvt-unicode_9.15-2+deb7u1.dsc
 e6fdf091860ecb458730dc68b0176f67f207a2f7 894764 rxvt-unicode_9.15.orig.tar.bz2
 d810cb15206a176f0910164ae92e129b9d599d1f 31577 
rxvt-unicode_9.15-2+deb7u1.debian.tar.gz
 580483cd39a3e1b09efef7e1eb97921cfe494dd5 1316844 
rxvt-unicode_9.15-2+deb7u1_amd64.deb
 de2cc3a2e182b1e3cbe52e0ebcccb5135db872b2 45654 
rxvt-unicode-ml_9.15-2+deb7u1_amd64.deb
 a6bb7983be63ff9a1ed4a9dbf3b9f735b2b42105 1319202 
rxvt-unicode-256color_9.15-2+deb7u1_amd64.deb
 f53106be4aca77f03854560d72dc6544b93b31aa 1081544 
rxvt-unicode-lite_9.15-2+deb7u1_amd64.deb
Checksums-Sha256: 
 6217ab1032e90d80ff7d1007b882a02211fcd1e5e4a79cf616be4b39dc8ac53a 3439 
rxvt-unicode_9.15-2+deb7u1.dsc
 ec1aa2932da844979ed8140bd92223defb12042aa5e877e05ac31139ca81f2b1 894764 
rxvt-unicode_9.15.orig.tar.bz2
 e4c49d6e09c34adc1c860d3fedb8cd3456722551701f3de8799df77026306312 31577 
rxvt-unicode_9.15-2+deb7u1.debian.tar.gz
 1838857a90adecf2dbd43dcdd99f0f25fca8d548bc0b23a7199e259292163003 1316844 
rxvt-unicode_9.15-2+deb7u1_amd64.deb
 c6e475a17a72a5a217e1e2cd699e487421815678094ddbd309ea22dd30d1a236 45654 
rxvt-unicode-ml_9.15-2+deb7u1_amd64.deb
 4a8566c606cb9c26e51f12ee3e8eca4737c82fcdedcbcdf704ce1105520a0936 1319202 
rxvt-unicode-256color_9.15-2+deb7u1_amd64.deb
 e66f64604b31d87f977e6b5b9c41de8d4ac949f81504e8f5cf83cc62c9c1d06d 1081544 
rxvt-unicode-lite_9.15-2+deb7u1_amd64.deb
Files: 
 28569c80f7bcfd7f6cb5b620bf0d5434 3439 x11 optional 
rxvt-unicode_9.15-2+deb7u1.dsc
 15595aa326167ac5eb68c28d95432faf 894764 x11 optional 
rxvt-unicode_9.15.orig.tar.bz2
 855c2c3535692472b565f3e06c20645c 31577 x11 optional 
rxvt-unicode_9.15-2+deb7u1.debian.tar.gz
 5779de873faa2bb6b12d0402bf732104 1316844 x11 optional 
rxvt-unicode_9.15-2+deb7u1_amd64.deb
 380f890890d19b2b5367ddd2f65eeb1e 45654 oldlibs extra 
rxvt-unicode-ml_9.15-2+deb7u1_amd64.deb
 9f04b94667dba19e994976ed19d55d3e 1319202 x11 optional 
rxvt-unicode-256color_9.15-2+deb7u1_amd64.deb
 df52b0fcdc04dddb22192cfe0ccaa9ee 1081544 x11 optional 
rxvt-unicode-lite_9.15-2+deb7u1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)
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=fGXw
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to