[Secure-testing-team] Bug#481186: CVE-2008-2149: buffer overflows
Steffen Joeris
steffen.joeris at skolelinux.de
Fri May 16 12:11:33 UTC 2008
Hi Andreas
Sorry for the late reply.
> I've got no answer to this question for nearly 24 hours. Because I
> consider it more important to fix a known issue _now_ instead of doing a
> long research for other issues for perhaps weeks I will upload packages
> with the proposed fix in the next hour. Other issues might be solved in
> later uploads.
For testing-security just make sure you upload with priority=high .
I would not want to think about DTSAs or migration stuff yet, because I
suspect that there will be some development in the near future by fixing more
of the security bugs.
We'll get back to you, if we need any further maintainer interaction regarding
testing.
I can't say anything about stable though.
> Please tell me what I should do to support the security team. It's just
> my first security relevant bug.
Thanks for your work, it is good to see a maintainer being very responsive and
pationate about it.
Cheers
Steffen
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part.
Url : http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20080516/db0cb234/attachment.pgp
More information about the Secure-testing-team
mailing list