I'm just sending this out as a 'request for comment' really --

I notice debian-stable has a package for squid which (besides being
 security-updated already) still has a known buffer overflow in it
 (although it is apparently of 'unknown risk').

See:
http://www.squid-cache.org/Versions/v2/2.4/bugs/#squid-2.4.STABLE7-url_escape

I reported this and was told that it was considered 'not important' and
 would be sorted out when other things had been sorted out...

I wonder if this has been found to be really non-vulnerable or if debian
 policy doesn't normally allow things to be updated unless a vulnerability
 has been proved to really exist??

I'm confused and would like to know what others think!

-enyc <[EMAIL PROTECTED]>

Reply via email to