[Secure-testing-team] Bug#481186: CVE-2008-2149: buffer overflows

Steffen Joeris steffen.joeris at skolelinux.de
Fri May 16 12:11:33 UTC 2008


Hi Andreas

Sorry for the late reply.
> I've got no answer to this question for nearly 24 hours.  Because I
> consider it more important to fix a known issue _now_ instead of doing a
> long research for other issues for perhaps weeks I will upload packages
> with the proposed fix in the next hour.  Other issues might be solved in
> later uploads.
For testing-security just make sure you upload with priority=high .
I would not want to think about DTSAs or migration stuff yet, because I 
suspect that there will be some development in the near future by fixing more 
of the security bugs. 
We'll get back to you, if we need any further maintainer interaction regarding 
testing.
I can't say anything about stable though.


> Please tell me what I should do to support the security team.  It's just
> my first security relevant bug.
Thanks for your work, it is good to see a maintainer being very responsive and 
pationate about it.

Cheers
Steffen
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part.
Url : http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20080516/db0cb234/attachment.pgp 


More information about the Secure-testing-team mailing list