Bug#617655: unixodbc: buffer overflow in SQLDriverConnect function

2012-07-09 Thread Jonathan Wiltshire

On 2012-07-08 23:28, Steve Langasek wrote:

On Sun, Jul 08, 2012 at 07:15:10PM -, Jonathan Wiltshire wrote:
Recently you fixed one or more security problems and as a result you 
closed
this bug. These problems were not serious enough for a Debian 
Security
Advisory, so they are now on my radar for fixing in the following 
suites

through point releases:



squeeze (6.0.6) - use target stable


Please prepare a minimal-changes upload targetting each of these 
suites,
and submit a debdiff to the Release Team [0] for consideration. They 
will

offer additional guidance or instruct you to upload your package.


Since when do we expect maintainers to spend their time preparing 
stable
release updates for security bugs that are not important enough to 
have DSAs
issued?  I find this absurd.  If it's worth fixing, it should be 
fixed

through the security process.

This particular bug is a buffer overflow in handling of user-provided 
input
to a non-privileged library.  Don't expect me to prepare a stable 
upload for

this if it's not important enough to get a DSA.


Thanks for the information; tracker updated (and copying 
t...@security.debian.org

for your feedback).

--
Jonathan Wiltshire  j...@debian.org
Debian Developer http://people.debian.org/~jmw

4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#617655: unixodbc: buffer overflow in SQLDriverConnect function

2012-07-08 Thread Jonathan Wiltshire
Dear maintainer,

Recently you fixed one or more security problems and as a result you closed
this bug. These problems were not serious enough for a Debian Security
Advisory, so they are now on my radar for fixing in the following suites
through point releases:

squeeze (6.0.6) - use target stable

Please prepare a minimal-changes upload targetting each of these suites,
and submit a debdiff to the Release Team [0] for consideration. They will
offer additional guidance or instruct you to upload your package.

I will happily assist you at any stage if the patch is straightforward and
you need help. Please keep me in CC at all times so I can
track [1] the progress of this request.

For details of this process and the rationale, please see the original
announcement [2] and my blog post [3].

0: debian-rele...@lists.debian.org
1: http://prsc.debian.net/tracker/617655/
2: 201101232332.11736.th...@debian.org
3: http://deb.li/prsc

Thanks,

with his security hat on:
--
Jonathan Wiltshire  j...@debian.org
Debian Developer http://people.debian.org/~jmw

4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51




-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#617655: unixodbc: buffer overflow in SQLDriverConnect function

2012-07-08 Thread Steve Langasek
On Sun, Jul 08, 2012 at 07:15:10PM -, Jonathan Wiltshire wrote:
 Recently you fixed one or more security problems and as a result you closed
 this bug. These problems were not serious enough for a Debian Security
 Advisory, so they are now on my radar for fixing in the following suites
 through point releases:

 squeeze (6.0.6) - use target stable

 Please prepare a minimal-changes upload targetting each of these suites,
 and submit a debdiff to the Release Team [0] for consideration. They will
 offer additional guidance or instruct you to upload your package.

Since when do we expect maintainers to spend their time preparing stable
release updates for security bugs that are not important enough to have DSAs
issued?  I find this absurd.  If it's worth fixing, it should be fixed
through the security process.

This particular bug is a buffer overflow in handling of user-provided input
to a non-privileged library.  Don't expect me to prepare a stable upload for
this if it's not important enough to get a DSA.

-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
Ubuntu Developerhttp://www.debian.org/
slanga...@ubuntu.com vor...@debian.org


signature.asc
Description: Digital signature


Bug#617655: unixodbc: buffer overflow in SQLDriverConnect function

2011-03-10 Thread Luciano Bello
Package: unixodbc
Version: 2.2.14p2-2
Severity: normal
Tags: upstream patch security

Hi,
 A buffer overflow in unixODBC has been reported in http://seclists.org/oss-
sec/2011/q1/446 . The fix can be found here 
http://unixodbc.svn.sourceforge.net/viewvc/unixodbc/trunk/DriverManager/SQLDriverConnect.c?r1=23r2=27

thanks! luciano



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org