[Secure-testing-team] page with unfixed holes

Paul Dwerryhouse paul at dwerryhouse.com.au
Fri Jan 28 03:10:55 UTC 2005


On Tue, Jan 18, 2005 at 06:05:16PM -0500, Joey Hess wrote:
> I think the best way for this bug to be fixed is for the developer or a
> NMU to update it to the new upstream version. The security hole only
> affects the source package so is not very urgent for us, and just patching
> it in the diff isn't a complete fix since the tarball would continue to
> have the bad file.

Good point. Don't quite know what I was thinking when I did that ;)

I've mailed the maintainer, to find out if he's looking at the issue. In
the meantime, I've Debianised openslp 1.2.0, just in case:

http://leapster.org/linux/debian/tmp/

Cheers,

Paul.

-- 
Paul Dwerryhouse						| PGP Key ID: 
(not in) Melbourne, Australia					| 0x6B91B584




More information about the Secure-testing-team mailing list