[Secure-testing-team] page with unfixed holes
Paul Dwerryhouse
paul at dwerryhouse.com.au
Fri Jan 28 03:10:55 UTC 2005
On Tue, Jan 18, 2005 at 06:05:16PM -0500, Joey Hess wrote:
> I think the best way for this bug to be fixed is for the developer or a
> NMU to update it to the new upstream version. The security hole only
> affects the source package so is not very urgent for us, and just patching
> it in the diff isn't a complete fix since the tarball would continue to
> have the bad file.
Good point. Don't quite know what I was thinking when I did that ;)
I've mailed the maintainer, to find out if he's looking at the issue. In
the meantime, I've Debianised openslp 1.2.0, just in case:
http://leapster.org/linux/debian/tmp/
Cheers,
Paul.
--
Paul Dwerryhouse | PGP Key ID:
(not in) Melbourne, Australia | 0x6B91B584
More information about the Secure-testing-team
mailing list