-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Wednesday 07 January 2009 23:21:13 Florian Weimer wrote:
> I'm a bit in a hurry, so I can't give you a real-world example right
> now.  But suppose we've got a vulnerability in a package foo, with
> the following versions:
>
>    etch: 1.0-2
>    sid/lenny: 1.0-3
>
> sid is fixed by uploading a new upstream version, so the fixed
> version is 1.1-1.  For etch, we release 1.0-2+etch1.

So if you were to combine the rule I'm suggesting with the existing rule 
for unstable_version, the following would be considered fixed:

        >= 1.1-1
        >= 1.0-3
        >= 1.0-2+etch1

And there I see the problem.  The rule that says 1.0-2+etch1 or greater 
is fixed incorrectly asserts that 1.0-3 is fixed.

Fortunately, you're also telling me that this is dealt with by 
specifying _all_ fixed versions in the debsecan feed, not just the 
version that fixed this problem.

So this just comes down to "why is my debsecan broken", which probably 
doesn't warrant a BTS entry. :-)

Thanks,
Sheldon.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFJZeDqpGJX8XSgas0RAk08AJ43Oq9wy5TQHfbRtaFMmjSTdWOiSwCgn0iB
w9Bw6RfVfqiG8SWNP4cP560=
=zCJK
-----END PGP SIGNATURE-----



-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to