On Fri, Oct 19, 2007 at 12:18:44PM +0200, Arkadiusz Miskiewicz wrote:
>
> I wonder why no new release is made when security bug is found?
You probably open a good topic. We have never talked about any
release policy. So, my point of view:
This is upstream, we are not doing support for end-users.
I don't see __real__ demand for release immediately after every
important bug. I prefer stable and well tested maintenance release
every 2-3 months (e.g. 2.13.1) and major release every 4-6 months
(e.g. 2.14).
Let's flame :-)
The patch for CVE-2007-5191 is available in stable branch and will be
included in the next stable maintenance release 2.13.1 with others
bug fixes.
Note, I think important bugs should be reported in this list together
with patches. Sorry for CVE-2007-5191 (it wasn't public in commit time,
...). The patch:
http://git.kernel.org/?p=utils/util-linux-ng/util-linux-ng.git;a=commit;h=ebbeb2c7ac1b00b6083905957837a271e80b187e
CVE-2007-5191 is not critical according to discussion in vendor-sec
mailing list.
Karel
--
Karel Zak <[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe util-linux-ng" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html