On Mon, Dec 03, 2012 at 12:00:18PM +0100, Alessandro Ghedini wrote:
> forwarded 694999 http://code.google.com/p/cityhash/issues/detail?id=10
> kthxbye
> 
> On Mon, Dec 03, 2012 at 08:22:47AM +0100, Moritz Muehlenhoff wrote:
> > Package: cityhash
> > Severity: grave
> > Tags: security
> > Justification: user security hole
> > 
> > Hi,
> 
> Hi,
> 
> > please see http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6051
> > 
> > I'm not sure if/when this was fixed upstream, so better contact upstream.
> 
> I opened a ticket upstream but it doesn't appear to be fixed. It's not clear 
> if
> Debian is affected though: the CVE was published 6 days after the 1.1.0 
> release
> which partially reworked the hashing algorithms, but Debian currently has only
> the one-year-old 1.0.3 version (the sid version was reverted to 1.0.3
> yesterday), which may not be affected.
> 
> Though, if 1.0.3 is affected and if 1.1.0 is the fix (or if the fix is based 
> on
> it) I don't think it would be suitable for a wheezy upload, since the reworked
> algorithms are not retrocompatible (see #694916).

Given that there are no rdeps in Wheezy and cityhash hasn't been part of a 
release it would make more sense to start with the reworked 1.1.0 version?
Even if it's late in the freeze.

Cheers,
        Moritz


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to