On Wed, Sep 06, 2006 at 12:03:34PM +0200, Lionel Elie Mamane wrote:

> There seems to have been a screw-up in handling of mailman security
> and stable updates: There are two different mailman packages in Debian
> with version number 2.1.5-8sarge3.

>  -8sarge3 maintainer update (that got frozen waiting for -8sarge2 to
>   happen in order not to conflict with it) to fix bug #358575, a
>   severity critical bug.

>  -8sarge3 security update to fix:
>   formt string vulnerability [src/common.c, 
> debian/patches/72_CVE-2006-2191.dpatch]
> 

> The situation right now:

>  - sarge r3 contains mailman 2.1.5-8sarge3, but some architectures
>    have the security update (such as i386) and others have the
>    maintainer update (such as source, sparc and alpha).

>    Thus all architectures are screwed up in one way or the other.

> Stable release team, please react accordingly; you may for example
> do a binary sourceless NMU for the architectures that have -8sarge3
> the security update so that they all have -8sarge3 the maintainer
> update.

I have now heard about what the security problem addressed in -8sarge3
the security update is. It is believed not to be exploitable. I thus
now officially request a binary NMU to replace -8sarge3 the security
update by -8sarge3 the maintainer update on the arches that have
-8sarge3 the security update.

-- 
Lionel


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to