Package: debsecan
Version: 0.2
Severity: normal

First of all let me thank you for the package. I was thinking about
hacking up something like that myself but always postponed the project
until later on. So thank you very much -- now you've got an active
user/tester thus you might get an increase in the amount of bug
reports :-)

On my first try of the package I've decided to do full system
"security upgrade", so I ran

>apt-get install  $(debsecan --suite sid --format packages --only-fixed)

and it gave me:

cpio is already the newest version.
libnetpbm10 is already the newest version.
libnetpbm9 is already the newest version.
linux-image-2.6.12-1-386 is already the newest version.
netpbm is already the newest version.

I decided to look closer onto cpio package:
> dpkg -l cpio
ii  cpio           2.6-9          GNU cpio -- a program to manage archives of 

>debsecan --suite sid --format summary --only-fixed | grep cpio
CVE-2005-4268 cpio (fixed)


http://idssi.enyo.de/tracker/source-package/cpio
lists CVE-2005-4268 among "open issues" and the other resolved issues
are covered by 2.6-9, thus nothing really has to be upgraded

Please let me know if more details necessary

Also it would be helpful to track the issue if there was at least some
optional debugging output (such vulnerabilities for package X are
found, this this and that one are fixed, etc depending on the logic of
debsecan)

Thanks once again for a nice tool

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (600, 'unstable'), (300, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.13-mm1
Locale: LANG=ru_RU.KOI8-R, LC_CTYPE=ru_RU.KOI8-R (charmap=KOI8-R)

Versions of packages debsecan depends on:
ii  python                        2.3.5-3    An interactive high-level object-o

debsecan recommends no packages.

-- no debconf information


--Yarik


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to