Hi,
* Michael S. Gilbert <[email protected]> [2009-08-09 18:42]:
> On Sun,  9 Aug 2009 13:56:23 +0000 Nico Golde wrote:
> 
> > Author: nion
> > Date: 2009-08-09 13:56:23 +0000 (Sun, 09 Aug 2009)
> > New Revision: 12531
> > 
> > Modified:
> >    data/CVE/list
> > Log:
> > add todos for new items, please do that as well next time
> > 
> > Modified: data/CVE/list
> > ===================================================================
> > --- data/CVE/list   2009-08-09 13:55:11 UTC (rev 12530)
> > +++ data/CVE/list   2009-08-09 13:56:23 UTC (rev 12531)
> > @@ -4,11 +4,13 @@
> >     - rubygems <not-affected>
> >     NOTE: debian's version installs gems packages to /var/lib/gems,
> >     NOTE: so no opportunity to overwrite system files
> > +   TODO: request CVE id
> 
> ok, is a mail to oss-sec like yours sufficient?  also, i thought there
> were going to be some workflow changes where the security team could
> autonomously assign a CVE from a pool allocated to debian.  are there
> any formal plans for that?  or would that only be done along with a DSA?

Sorry misunderstanding, I was just referring to the TODO 
entries. Just add those TODOs in the future and you'll be 
fine. Just want to make sure nothing is missing later.

Cheers
Nico
-- 
Nico Golde - http://www.ngolde.de - [email protected] - GPG: 0xA0A0AAAA
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpqkoeMlkuVI.pgp
Description: PGP signature

_______________________________________________
Secure-testing-team mailing list
[email protected]
http://lists.alioth.debian.org/mailman/listinfo/secure-testing-team

Reply via email to